Professional Documents
Culture Documents
WATERMARKING
Department of Informatics
University of Thessaloniki
Thessaloniki 54006, Greece
Email: pit as@zeus.csd.auth.gr
238
mixed watermark
Original image and a place
for embedding
an empty box f? of size N x N where N 5 m i n ( M 1 M 2 ) . Watermark embedding is described by the the size
The automorphism A N ( k ) is applied n times by choos- N of I?, the position (p1 ,p z ) o f I’ in I, the parameter
ing a parameter k . The result is a mixed watermark S’ k of the antomorphism and the number of iterations n
with a chaotic reallocation of pixels without effect on for mixing. An examble of the embedding procedure is
their bitmap intensity. given in Figure 1. The watermark “rabbit” is spread
Let I‘ be an N x N subset of I which is determined chaotically by the automorphism A&(15$ in a 186 x
by its size N and its position in I, say e.g. the upper- 186 area (the f?) and is embedded in 256 x 256 ‘Zena”
left corner (pl , p 2 ) . We correspond the pixels of B to at the position (65,65).
the pixels of I’ by a 1-1 map p
B 3 r = ( i 1 j ) A B ) ( k l / )- rP I =(k+pl,/+pz)
3.2. Watermark detection
or symbolically For a given Is,the watermark detection demands the
r‘ = f(r) (8) knowledge of the numbers N , p 1 ~ p k2 and ~ n (the key).
Now we embed the watermark S by altering the inten- We extract the subset I’ fiom Is which is determined
sity levels of the pixels d image I and we get the signed by p l r p 2 and N . For every pixel I-‘ in I’we calculate the
image corresponding average Arl and we form the following
N x N bitmap set :
I,={~>,X‘E L , z > E{Olll..lG-l}} (9)
where
z$ = g(zrl) if r = f-’(r’) E L,
z$ = zp if r = f-’(r’) 6L ,
The “embedding” function g is selected in such a way
that to be able to determine a “detection” function D U contains the mixed watermark 5’’. By apply-
with the following output : in the automorphism AN(^) P - n times on U (i.e.
where P is the recurrence time, the pixels
D ( d p ) = 1 if r = f - l ( r ‘ ) E L, and yr = 1 which belong to S’ are reallocated and they form the
D(z’p) = 0 if r = f-l(r‘) E L, and Yr = 0 initial watermark S. The rest of the pixels in U show a
D(z’p) = o or 1 if r = f - l ( r ’ ) $ L , “random” distribution. In Figure 2 the reconstruction
of the watermark is illustrated. Figure 2a presents the
Several superposition techniques can be applied by choos- watermarked image of ‘Zena”. The set U is shown in
ing appropriate functions g and D. Also they may de- Figure 2b. By applying the automorphism A186(15) 18
pent on the pixels arround the signed pixel z’rl so that times (the recurrence time for IC = 15 and N = 186 is
the method to be robust. 48) the watermark is reconstructed (Figure k).
239
(c) Reconstruction of
(b) The set U the watermark
Figure 2 The reconstruction of the logo “rabbit” from “Lena” (watermarked image)
240