You are on page 1of 10

available to protect visual data, digital

Multiresolution watermarking is probably the one that has


Watermark Based On received the greatest attention. The idea of robust

Wavelet Transform watermarking of images, is to embed

For Digital Images information data within the image with an


insensible form for human visual system but in a
way that protects from attacks such as common
image processing operations. The goal is to
produce an image that looks exactly the same to
Abstract: a human eye but still allows its positive
identification in comparison with the owner's
The overabundant and easily accessible digital key if necessary. This paper attempts to first
data on the internet, has made it the most introduce the general idea behind digital
vulnerable information-store subject to piracy. watermarking as well as some of its basic
Digital watermarking is a tool developed to fight notions. It is followed by describing some
piracy. The rapid expansion of the internet in the applications of watermarking techniques and the
recent years has rapidly increased the availability difficulties faced in this new technology. The
of digital data such as audio, images and videos paper ends with an overview on some copyright
to the public. As we have witnessed in the past protection techniques, involving watermarking
few months, the problem of protecting and it is also seen as to why digimarks have
multimedia information becomes more and more become an important research subject of late.
important and a lot of copyright owners are
concerned about protecting any illegal
duplication of their data or work. Some serious
work has to be done to maintain the availability
Basis on Watermarking
of multimedia information and at the same time
protecting the intellectual property of creators, The increasing amount of applications using

distributors or simple owners of such data. This digital multimedia technologies has accentuated

is an interesting challenge and is probably the the need to provide copyright protection to

reason why so much attention has been drawn multimedia data. Digital watermarking is a
method that has received a lot of attention in the
past few years. A digital watermark can be
described as a visible or preferably invisible
identification code that is permanently embedded
in the data . It means that it remains present
within the dataafter any decryption process .a

toward the development of digital images general definition can be given:

protection schemes. Of the many approaches


"!Hiding of a secret message or information obvious identification key, which removes the

within an ordinary message and the extraction image's commercial value. On the other hand,
invisible watermarks are used for content and/or
of it at its destination!"
author identification in order to be able to
Complementary to encryption, it allows some
determine the origin of an image. They can also
protection of the data after decryption. As we
be used in unauthorized image's copies detection
know, encryption procedure aims at protecting
either to prove ownership or to identify a
the image (or other kind of data) during its
customer. The invisible scheme does not intend
transmission. Once decrypted, the image is not
to forbid any access to an image but its purpose
protected anymore. By adding watermark, we
is to be able to tell whether a specified image has
add a certain degree of protection to the image
been used without the owner's formal consent or
(or to the information that it contains) even after
if the image has been altered in any way. This
the decryption process has taken place. The goal
approach is certainly the one that has received
is to embed some information in the image
the most attention in the past couple of years. In
without affecting its visual content. In the
that line of thought, it is possible to differentiate
copyright protection context, watermarking is
two ways of embedding
used to add a key in the multimedia data that
authenticates the legal copyright holder and that Invisible information in digital image.
cannot be manipulated or removed without In Spatial Domain
impairing the data in a way that removes any
The first watermarking scheme that was
commercial value. Figure 1 is a general
introduced, works directly in the spatial domain.
watermarking scheme intended to give an idea of
By some image analysis operations (e.g. Edge
the different operations involved in the
detection), it is possible to get perceptual
process.
information about the image, which is then used
to embed a watermarking key, directly in the
intensity values of predetermined regions of the
image. That pretty simple technique provide a
simple and effective way for embedding an
invisible watermark into an original image but
The first distinction that one needs to do in the
doesn’t show robustness to common image
study of watermarking for digital images is the
alterations.
notion of visible watermarks versus invisible
In Transform Domain
ones. The first ones are used to mark, obviously
Another way to produce high quality
in a clearly detectable way, a digital image in
watermarked image, is by first transforming the
order to give a general idea of what it looks like
original image into the frequency domain by the
while preventing any commercial use of that
use of Fourier, Discrete Cosine or Wavelet
particular image. The purpose here is to forbid
transforms for example. With this technique, the
any unauthorized use of an image by adding an
marks are not added to the intensities of the objective is to permanently and unalterably mark
image but to the values of its transform the image so that the credit or assignment is
coefficients. Then, inverse-transforming the beyond dispute. In the event of illicit usage, the
vi watermark would facilitate the claim of
si invis ownership, the receipt of copyright revenues, or
Purpose
bl ible
e the success of prosecution.
validation of intended
- p VISIBLE VS. INVISIBLE
recipient
non-reputable transmission - p WATERMARKS
deterrence against theft p p Visible and invisible watermarks both serve to
diminish commercial value
- p deter theft but they do so in very different ways.
without utility
Discourage unauthorized Visible watermarks are especially useful for
p s
duplication
digital notarization and conveying an immediate claim of ownership.
s p
authentication The main advantage of visible watermarks, in
identify source p s
marked coefficients forms the watermarked principle at least, is that they virtually eliminate

image. The use of frequency based transforms the commercial value of the document to a

allows the direct understanding of the content of would-be thief without lessening the document's

the image, therefore, characteristics of the human utility for legitimate, authorized purposes.

visual system (HVS) can be taken into account Invisible watermarks, on the other hand, are
more easily when it is time to decide the more of an aid in catching the thief than
intensity and position of the watermarks to be discouraging the theft in the first place. Though
applied to a given image. neither exhaustive nor definitive, Table 1 shows
Types Of Digital Watermarks some anticipated primary (p) and secondary (s)
Two types of digital watermarks may be benefits to digital watermarking.
distinguished, depending upon whether the
watermark appears visible or invisible to the
casual viewer. Visible watermarks are used in
much the same way as their bond paper
Table 1.
ancestors, where the opacity of paper is altered
by physically stamping it with an identifying
TABLE 1 CAPTION: Visible watermarks
pattern. This is done to mark the paper
diminish the commercial value of the
manufacturer or paper type. One might view document or image. Invisible watermarks
increase the likelihood of successful
digitally watermarked documents and images as
prosecution. Invisible watermarks may also
digitally "stamped". Invisible watermarks, on the act as a deterrent if perpetrator is aware of
their possible use.
other hand, are potentially useful as a means of
identifying the source, author, creator, owner, REQUIREMENTS OF
distributor or authorized consumer of a WATERMARKS
document or image. For this purpose, the
To be effective in the protection of the different specific characteristics. Nevertheless, it
ownership of intellectual property, the invisibly is possible to list a set of basic requirements for
watermarked document should satisfy several robust watermarks.
criteria: Those are a generalization, but should allow the
1. the watermark must be difficult or reader to understand, once again, the main
impossible to remove, at least without difficulties involved in the design of digimarks
visibly degrading the original image, systems and should also act as natural
2. the watermark must survive image preliminaries to the following paragraph
modifications that are common to discussing the difficulties of that technology.
typical image-processing applications Perceptual Transparency : Use characteristics
(e.g., scaling, color requantization, of the HVS to assure that the watermark is not
dithering, cropping, and image visible under typical viewing conditions.
compression), Basically, it means that a watermarked image
3. an invisible watermark should be should not seem any different from the original
imperceptible so as not to affect the (unwatermarked) one; i.e. one should not notice
experience of viewing the image, and any degradation in the perceived quality. Other
4. for some invisible watermarking types of watermarks are meant to be visible, but
applications, watermarks should be in most applications they are not and this is why
readily detectable by the proper we treat transparency as a basic requirement of
authorities, even if imperceptible to the digital watermarking.
average observer. Such decodability
without requiring the original, un- Robustness : Watermark still can be detected
watermarked image would be necessary after the image has undergone attacks (malicious
for efficient recovery of property and or not) compression, halftoning, etc. Ideally, the
subsequent prosecution. amount of image distortion necessary to remove
the watermark should degrade the desired image
FEATURES OF DIGITAL
WATER MARKING quality to the point of becoming commercially
valueless.
As the name suggests, the fragile watermarks are
meant to disappear if the image (or other data
Capacity : Allows insertion of multiple,
used) is corrupted. It can be really useful in
independently detectable watermarks in an
judiciary process, for example, where it is
image.
imperative to be certain that what is used is
Security : The basis of watermarking security
genuine. In contrast, robust watermarks are
should lie on Kerckhoff's assumption that one
designed to resist attacks (malicious or not) in
should assume that the method used to encrypt
order for the key to still be detectable after it has
the data is known to the unauthorized party. It
undergone them. The range of applications,
means that watermarking security can be
which include copyright protection, asks for very
interpreted as encryption security leading technologies. Of course, as in any area of
directly to the principle that it must lie mainly in research, unexpected troubles always arise either
the choice of the embedded key. with the underlying principles or during the
technical evolution of the concept.
Specificity : Watermark should be universal, i.e.
Attacks On Watermarks
applicable to images as well as audio and video
There are several kinds of malicious attacks,
media. In fact, that has been found not to be true;
which result in a partial or even total destruction
the general concept might be the same in
of the embed identification key and for which
multiple applications but, in watermarking, one
more advanced watermarking scheme should be
size does not fit all.
employed
Active attacks : Here, the hacker tries
As it might already be obvious for an attentive
deliberately to remove the watermark or simply
reader, a lot of difficulties are encountered while
make it undetectable. This is a big issue in
trying to define the ideal watermarking scheme
copyright protection, fingerprinting or copy
for a particular application.
control for example
Passive attacks : In this case, the attacker is not
• Digital watermarking algorithms
trying to remove the watermark, but simply
usually use the lower-order bit planes of
attempting to determine if a given mark is
the original image but so do intentional
present or not. As the reader should understand,
disturbance algorithms. The availability
protection against passive attacks is of utmost
of watermark readers allows copyright
importance in covert communications where the
thieves to determine if the watermark
simple knowledge of the presence of watermark
exists in the image or not.
is often more one wants to grant.

• In highly compressed JPEG images, Collusion attacks : In collusive attacks, the goal

there is a limited amount of data that of the hacker is the same as for the active attacks

can be used to insert digital watermarks. but the method is slightly different. In order to
remove the watermark, the hacker uses several
• The introduction of artifacts (such as copies of the same data, containing each
blockiness) by compression techniques different watermark, to construct a new copy
usually destroys watermarks easily. without any watermark. This is a problem in
fingerprinting applications (e.g. In the film
• Robustness and transparency are two
industry) but is not widely spread because the
fundamentally opposed requirements; a
attacker must have access to multiple copies of
tradeoff between the two must then be
the same data and that the number needed can be
made.
pretty important.
Those form only a brief overview of some Forgery attacks : This is probably the main
problems involved in digital watermarking concern in data authentication. In forgery
attacks, the hacker aims at embedding a new, characteristics of this transform domain are well
valid watermark rather than removing one. By suited for masking consideration since it is well
doing so, it allows him to modify the protected localized both in time and frequency. Besides,
data as he wants and then, re-implants a new wavelet transforms match the multi-channel
given key to replace the destructed (fragile) one, model of the HVS, so one can actually set a
Thus making the corrupted image seem genuine. numerical limit to the wavelets coefficients
Those four types of malicious attacks are alteration in order to stay under HVS just
only a categorization of what has been noticeable difference 3 (JND), for which our
encountered in the past. Of course, a lot of new eyes start to become aware of the modifications
attacks can be designed and it is impossible to in the image. Moreover the wavelet transforms
know what will come out next from hackers' match the HVS(Human Visual System) model,
imagination. To those malicious attacks, one so we can change the values of the wavelet
must add all signal processing operations coefficients in such a way that image alterations
involved in the transmission or storage of data, is not perceptible to our eyes. But the changes
which can naturally degrade the image and alter should be below the HVS just noticeable
the watermarked information to the point of not difference value 3, beyond which the eyes starts
being detectable anymore. In fact, the to recognize the changes made in the image.
identification and classification of attacks, as Besides, wavelet transforms is a part of
well as the implantation of a standard benchmark upcoming compression standards (such as JPEG-
for robustness testing is of great importance and 2000), so wavelet-based techniques would allow
will be a key issue in the future development of a much easier and optimized way to include a
watermarking. copyright protection device in the compression
Description code itself.

Let us discuss an example on watermarking A second important aspect of the technique

method proposed by Ward. This first generation used here is the way to introduce a watermark in

technique called Multiresolution Watermark for an image. A watermark should be introduced in

Digital Images works in the wavelet domain. perceptually significant regions of the data in

The modus operandi is pretty simple since it order to remain robust. However, by doing so,

consists of adding weighted pseudo-random we risk to alter the image (i.e. perceivably). The

codes to the large coefficients at the high and technique described here follows this

medium frequency bands of the discrete wavelet requirement to a certain degree, but tries to make

transform of an image. Even if it might first the introduced watermark as invisible as it can

appear theoretically straightforward, the actual while showing good robustness. As the reader

implementation is a little more complicated than will understand, we have chosen to ensure

it seems and great effort will be made here to transparency of the watermark and, at the same

clarify it. First of all, one must know why the time keep the robustness by embedding the

wavelets approach is used here. The information within only the high and medium
frequencies while keeping third resolution low wanted to test the robustness of our
frequencies, for which the HVS is most implementation to different type of attacks such
sensitive, untouched. The implemented as common image processing operations.
technique uses no oblivious watermark. In Watermark
copyright protection, it is reasonable to assume The first part of water marking process is
that the owner or the user who wants to verify encoder. The first step is to decompose the
the presence of a particular watermarking key image into three frequency bands using three
has access to the original unwatermarked image. resolutions of Haar wavelets. Figure 2’s Bank of
This type of watermarking scheme is called filters represent the idea of octave band structure
nonoblivious (or private) watermarking in of Haar wavelets, which gives pyramid structure
opposition to oblivious (or public) techniques, frequency localizations as shown in Figure 2.
such as copy protection where the image is not
Before we go on, we must point out that an
accasible.First, the multiresolution and
undersampling operation is done after every
hierarchical approach save computational load in
filtering. It must be understood that the choice of
detection. Then, it allows good transparency as it
the Haar wavelet in our system was one made for
uses characteristics of our visual system. As we
simplicity. However, we had in mind to
know, the HVS is more sensible to small
investigate the influence of the choice of the
perturbation in the lower frequency bands, thus
wavelet function in our results. But, in order to
keeping the low frequencies intact. This assures
test the robustness truthfully, we had to give up
that the watermarked image will be as close as
the idea in favor of the addition of extra
possible to the original one. It has to be noted
robustness testing procedures.The next operation
that, from a signal processing point of view, the
is to add a pseudo random sequence N , in fact a
requirements of transparency and robustness
Gaussian distribution of mean zero and variance
conflict each other. The developed method is
one, to the coefficients of the medium and high
well suited, because it allows a certain tradeoff
frequency bands (i.e. all the bands except the
between the two. Finally, and as already stated,
lowest one which is represented by the top left
the use of wavelet transform matches the
corner in Figure 3). The normal distribution is
upcoming image or video compression
used because it has been proven to be quite
standards, which means that such a
robust to collusive attacks. In order to weight the
watermarking scheme could easily be included
watermark according to the magnitude of the
as a part of JPEG-2000 or other wavelet-based
wavelet coefficients, we used one of the two
standard. Before proceeding with the description
following relations between the original
of encoding - decoding scheme, let us revisit the
coefficients y and ÿ, the ones containing
goals we had set at the beginning of the paper. In
the watermark:
the first place, we were willing to implement a
ÿ[m,n]=y[m,n]+alpha(y[m,n])2N[m,n]
perceptual watermarking scheme for digital
(1) ,ÿ[m,n]=y[m,n]+alpha
images based on wavelet transforms. Then we
abs(y[m,n])N[m,n] (2)
second resolution level (i.e. the bottom left
square in the pyramid structure of Figure 3. to

It has to be mentioned that the relations (1) and the computation aiming at finding for a peak.

(2), even though are mathematically different, Once again, if there is a peak, the watermark is

have the same goal, which is to put more weight called detected and if not, we go to the third

to the watermark added to high value wavelet resolution… and so on until we reach the ninth

coefficients. The parameter alpha is to control resolution limit. The main advantage of this

the level of the watermark. It is in fact a good technique is that while allowing good detection,

way to choose between good transparency or even in the presence of corruption, it keeps the

good robustness or a tradeoff between the two. level of false positive detection to a minimum

Finally, the two-dimensional inverse wavelet since the found signature has to go through

transform is computed to form ÿ, the detection step of positive identification to be

watermarked image. Figure 4 gives a good idea called detected. The detector step aims at
ensuring the maximum exactitude in the
detection of the owner identification key and, as
said previously, minimizing the number of false
positive detection. The results presented later on
should convince the reader of the performance of
of the main components of the encoder that we
our decoder.
have implemented for our project.
Robustness Testing
Decoder We'll focus only on the result of attacks due to
At the other end of the communication channel, widely spread image processing operations for
a decoder is used to extract the watermarked simplicity. By doing so, we make sure that our
information from the received image. Upon system could be used in the transmission of
reception of the supposedly watermarked image, images. Since this is an introduction to the
the algorithm first isolates the signature included watermarking subject, it gives a general idea of
in this image by comparing the DWT the kind of problems involved in the process and
coefficients of the image with those of the see how simple image processing operations, can
original (non-watermarked) one. The following affect the functioning of a watermarking method.
operation consists of taking the identified key to Furthermore, it must be pointed out that, one of
put in contrast with the found signature by the main problems to be solved in the field of
computing the crosscorrelation at the first digital watermarking is the absence of general
resolution level (i.e. highest frequency testing benchmark. Such examination procedure
coefficients). The watermark is called detected, has to be implemented and generalized in order
if there is a peak in the crosscorrelation to be able to compare different watermarking
corresponding to a positive identification. If techniques. Nevertheless, in order to test the
there is no central peak, the decoder adds the robustness of any implementation, here are three
testing procedures. The characteristics of chosen • In highly compressed JPEG images,
attacks can be summarized as follows (Fig 6): there is a limited amount of data that
can be used to insert digital watermarks.
* JPEG : Introduces blocking artefacts in • The introduction of artifacts (such as
the compressed images. blockiness) by compression techniques
* Halftoning : It is used for printing; it usually destroys watermarks easily.
gives the impression of grey levels while, in fact, • Robustness and transparency are two
there are only two levels (black & white). fundamentally opposed requirements; a
* Filtering : Of course, a lot of different tradeoff between the two must then be
kinds of filter are used in all areas of signal made.
processing. As samples, we have used low pass,
average and unsharp filters.

\
Applications

1. Finger Printing.
2. Indexing.
The Future of Digital Watermarking
3. Copyright Protection.
4. Broadcast monitoring.
The field of digital watermarking is still evolving
5. Data Authentication and Data Hiding.
and is attracting a lot of research interest. The

DIFICULTIES watermarking problem is inherently more


As it might already be obvious for an attentive difficult that the problem of encryption, since it
reader, a lot of difficulties are encountered while is easier to execute a successful attack on a
trying to define the ideal watermarking scheme watermark. In cryptography, a successful attack
for a particular application. often requires deciphering an enciphered
Some particular attention must be paid in message. In the case of digital watermarking,
order not to downgrade the quality of the merely destroying the watermark, usually by
source image too much by the insertion of digital slightly distorting the medium containing it, is a
watermark (i.e.Transparency requirement). successful attack, even if one cannot decipher or

• Digital watermarking algorithms detect any hidden message contained in the

usually use the lower-order bit planes of medium.

the original image but so do intentional Thus far, the SDMI has been unsuccessful in

disturbance algorithms. The availability their attempts to devise a secure watermarking

of watermark readers allows copyright scheme for audio files, and Stir Mark has been

thieves to determine if the watermark able to defeat all the commercially available

exists in the image or not. watermarking systems for image files. These
types of schemes still have the potential to
provide copyright protection, if more robust
watermarks can be developed along with
carefully designed protocols governing their use.
However, the technology must be combined with
proper legal enforcement, and industry standards
in order to be ultimately successful.

References
1. I J Cox, M L Miller and J A Bloom,
Watermarking Applications and their
Properties.

2. A H Paquet, R K Ward, Wavelet Based


Digital Watermarking .

3.

www.yahoo.com,www.google.c
om

You might also like