You are on page 1of 4

APPLICATIONS OF TORAL AUTOMORPHISMS IN IMAGE

WATERMARKING

G. Voyatzis and I. Pitas

Department of Informatics
University of Thessaloniki
Thessaloniki 54006, Greece
Email: pit as@zeus.csd.auth.gr

ABSTRACT The watermarking methods that have been pro-


Digital watermarking methods have been recently pro- posed are classified in two main categories:
posed for various purposes and especially for copyright (a) Embedding in the frequency domain. A small
protection of multimedia data. The digital watermark subset of the frequency spectrum of particular blocks is
is embedded in a digital signal or an image and must be modified. This subset belongs to the medium range of
unrecognizable by unauthorized persons and detectable the spectrum so that to combine perceptual invisibility
only by the legal copyright owner. In this paper we and robustness to JPEG compression and other image
use toral automorphisms as chaotic 2 D integer vec- processing [I,3,4].
tor generators in order to manipulate digital image wa- (b) &bedding in the spatial domain. A pseudo-
termarking. We propose also an embedding algorithm random set of pixels is selected and the least significant
which provides robustness under filtering and compres- bits of their intensity levels are modified m such way
sion. that to form a statistical property which describes only
a specific set of pixels (the watermark). This method
1. INTRODUCTION is very fast and reliable [2,5]. A robust version of this
method under filtering, cropping and compression al-
The embedding of an additional information in mul- gorithms is represented in [SI.
timedia products can be met with several applications In this paper we propose a spatial embedding of a
(tamper proofing, embedded captions, e.t.c.)[l]. Nowa- watermark which is assumed to be a bitmap logo i.e.
days a very important application of the embedded in- an image which consists of a m a l l number of pixels
formation is to mark the ownership of the associated which are described by 0’s and 1’s. Our watermark-
multimedia data [2]. ing method is described in section 3 and is based on a
A digital watermark (sometimes called digital sig- family of chaotic tranformations which are called toral
nature) is a digital signal carrying out information about antomorphisms. Some of their properties are discussed
the copyright owner (e.g. an author’s signature or a in the next section.
company logo) which is hidden in multimedia data in
such a way that i) it is perceptually invisible ii) its ex- 2. TWO-DIMENSIONAL TORAL
istence can be detected only by an authorized person AUTOMORPHISMS
and iii) it is impossible to be removed without signif-
icant distortion of the total amount of data. The ap- A two-dimensional “torus automorphism” can be wn-
plication of a watermark in digital images is a difficult sidered as a spatial transformation of planar regions
problem since many filters for image processing have which belong in a square two- dimensional asea. It is
been developed in order to remove information which defined in the subset U = [0, 1) x [0,1) c R2 by the
does not affect the visual perception of the image (e.g. following formula [7]:
compression keeping high quality) or to modify an im-
age for various purposes. Another difficulty arises from
the fact that a digital image provides a relatively short r’=Ar,( !:)=( a21 a=
i) ( m o d l ) (1)
signal, where the additional information has to be in-
cluded, and very slight modifications are permitted in where aij E 2, detA = 1 and XI,^ E R - { - l , O , 1) are
order to avoid visually perceptible alterations. the eigenvalues of k Iterated actions of A on a point

0-7803-3258-X/96/$5.00 0 1996 IEEE 237


ro form a dynamical system which can be expressed t = tr(A) = a11 + u22, we obtain a one-parameter fam-
like a map ily of bra1 automorphisms IT. A great subset of 'T
is represented by the family of one-parameter systems
r,+l = A"r0 (mod 1) or r,+l = A r , (mod 1) (2) AN(^) : L --t L which is defined as follows :
where n = 0 , 1 , 2 , .... The set of points {ro,rl , r2, ...} is
an orbit of the system. It can be shown that r, E U , V i
and for every ro E U i.e. U remains invariant under
the automorphism. where (2, , yn) E L = [0, N - l ] x [0, N-11. For the N-1
We consider the action of the system (2) on a subset integer values of k in the domain [ 1 , N ) we obtain a
VOc U. Then VO is transformed to a subset VI c U fmite family of systems AN(^). The greatest eigenvalue
which occupies the same area like VOsince detA = 1. n + + +
is A 1 = 1 0 . 5 ( k (k2 2k)lj2) and is real for every
iterated transformations produce a subset V, which is k > 0.
characterized as strongly chaotic. System (2) distorts An extended study of the periodic orbits of auto-
auy area element, that spreads over the entire available morphisms can be found in [8,9]. All the orbits of sys-
area. The subset V, does not show significant correla- tem (4) are unstable periodic orbits with periods T
tions with its initial state VO. Roughly speaking, this which depend on k,N and the initial point of the orbit.
property is called "mixing". A famous automorphism We state the following corollary :
in dynamics is the "cat map" ( a l l = l l u 1 2 1,u21 = For any integer lattice L of size N there is un integer
1,u22 = 2). P = P ( k ,N) such that
Although the automorphisms are strongly chaotic
they possess a dense set of periodic orbits which cor- AG(k)r = r ( m o d N ) , V r E L (5 )
respond to the points with rational coordinates. For
any point ro = ( P I / Q I , P ~ / Qc~ )U with pa, qz E Z+ CO- We call the integer P recuwence time. Thus, any lat-
primes, there exists a "period" T , which depends on r, tice point is a fixed point under the action of A$&).
such that ATro = ro (mod 1). We consider the discrete The behaviour of the function P = P(N,k) is quite
subset W of U which is defined as irregular and this is caused by the complication of the
integer arithmetic rather than by the chaotic properties
W = {(x,Y)~X = k / N , Y = I / N , k , I E {0,1, ..,N - 1) } of the automorphism. An orbit itself usually displays
an unstable behaviour and a chaotic distribution in the
where N is the least common multiple of q1,qz. ro be- lattice.
longs t~ W which remains invariant under the action of
an automorphism, i.e. all the points of an orbit belong
3. EMBEDDING A N D RECONSTRUCTING
to W . Thus, the evolution of the orbits in W under
the automorphism (1) is equivalent to the evolution of A WATERMARK
orbits in an integer lattice L = { ( k , i ) , O 5 k , l < N }
A digital image can be understood as a rectangular
under an automorphism where the periodic condition
mesh of size M1 x M2. Each point of the mesh (a
(mod 1) is replaced by (mod N).
pixel) is characterized by its grey level or by the three
All the periodic orbits are unstable and their points
intensity levels of red, green and blue colour. Next we
are distributed irregulary in L. Thus the automor-
consider a grey level image which is represented as :
phisms can be directly applied on the space of a dig-
ital image in order to produce a chaotic mixing. We
I ={ ~ i j (, i , j ) E L , xij E {0,1, .., G - 1)) (6)
mention also that the dynamics of the chaotic orbit-
s can be described exactly without numerical errors, where L is an M I x M2 lattice of grid size 1 and G is
because computations are performed by using integer the total number of intensity levels.
z i t hmetic,
The evolution of the orbits in L depends exclusively 3.1. Embedding
on the one of the eigenvalues (say A , ) of the automor-
phism, since A2 = l / A l , and it is described by the In image (6) we want embed a watermark which is
congruent [SI : a bitmap image of the form:

I' = AI($ (modN) . (3) s = { ~ i j , ( i , .Ei )L ~ , w ~ E { O , ~ ) ) (7)


where E ' , [ are quadratic integers which correspond to where L, is an SIx 5'2 lattice of grid size 1 such that
integer vectors ( k , I ) E L. Since A1 is a function of S1 << M I and S2 << M2. The watermark S is located in

238
mixed watermark
Original image and a place
for embedding

Figure 1: Ehbedding of the logo “rabbit” in ‘Zena” (original image)

an empty box f? of size N x N where N 5 m i n ( M 1 M 2 ) . Watermark embedding is described by the the size
The automorphism A N ( k ) is applied n times by choos- N of I?, the position (p1 ,p z ) o f I’ in I, the parameter
ing a parameter k . The result is a mixed watermark S’ k of the antomorphism and the number of iterations n
with a chaotic reallocation of pixels without effect on for mixing. An examble of the embedding procedure is
their bitmap intensity. given in Figure 1. The watermark “rabbit” is spread
Let I‘ be an N x N subset of I which is determined chaotically by the automorphism A&(15$ in a 186 x
by its size N and its position in I, say e.g. the upper- 186 area (the f?) and is embedded in 256 x 256 ‘Zena”
left corner (pl , p 2 ) . We correspond the pixels of B to at the position (65,65).
the pixels of I’ by a 1-1 map p

B 3 r = ( i 1 j ) A B ) ( k l / )- rP I =(k+pl,/+pz)
3.2. Watermark detection
or symbolically For a given Is,the watermark detection demands the
r‘ = f(r) (8) knowledge of the numbers N , p 1 ~ p k2 and ~ n (the key).
Now we embed the watermark S by altering the inten- We extract the subset I’ fiom Is which is determined
sity levels of the pixels d image I and we get the signed by p l r p 2 and N . For every pixel I-‘ in I’we calculate the
image corresponding average Arl and we form the following
N x N bitmap set :
I,={~>,X‘E L , z > E{Olll..lG-l}} (9)

where

z$ = g(zrl) if r = f-’(r’) E L,
z$ = zp if r = f-’(r’) 6L ,
The “embedding” function g is selected in such a way
that to be able to determine a “detection” function D U contains the mixed watermark 5’’. By apply-
with the following output : in the automorphism AN(^) P - n times on U (i.e.
where P is the recurrence time, the pixels
D ( d p ) = 1 if r = f - l ( r ‘ ) E L, and yr = 1 which belong to S’ are reallocated and they form the
D(z’p) = 0 if r = f-l(r‘) E L, and Yr = 0 initial watermark S. The rest of the pixels in U show a
D(z’p) = o or 1 if r = f - l ( r ’ ) $ L , “random” distribution. In Figure 2 the reconstruction
of the watermark is illustrated. Figure 2a presents the
Several superposition techniques can be applied by choos- watermarked image of ‘Zena”. The set U is shown in
ing appropriate functions g and D. Also they may de- Figure 2b. By applying the automorphism A186(15) 18
pent on the pixels arround the signed pixel z’rl so that times (the recurrence time for IC = 15 and N = 186 is
the method to be robust. 48) the watermark is reconstructed (Figure k).

239
(c) Reconstruction of
(b) The set U the watermark

Figure 2 The reconstruction of the logo “rabbit” from “Lena” (watermarked image)

4. CONCLUSIONS media”, Tech. Report, NEC research Institute, 95-


10, p.1.
In this paper we introduce a chaotic transformation of
I. Pitas and T. Kaskalis, “Applying Signatures on
images which is based on the mixing property of bra1
Digital Images”,proc. BEE Workshop a Nonbin-
automorphisms and we proposed a method for embed-
~ X X TSignal and Image processing, 1.Pitas (ed) , Vol
ding a watermark in a digital image. The watermark
I, p.460, 1995.
is mixed by the chaotic system (4)and is embedded in
an image such that its visual perception remains the A.G.Bors and LPitas “Embedding parametric dig-
same. The watermark detection from the signed image ital signatures in images” p c . of EUSIPCO’94,
is done by applying the same system and by using a Dieste, Italy 10-13 Sep 1996 (accepted).
specific set of parameters which characterizes the wa-
E. Koch and J.Zhao, ‘Towards Robust and Hidden
termark embedding. A more complex mixing, possess-
ing more independent parameters, can mise if we use Image Copyright Labeling” p o c . BEE workshop
a Nonhear Signal and Image processing, I.Pitas
different automorphisms on sublattices having different
sizes. (ed) , Vol I, p.452, 1995.
The embedding procedure, which has been used to 0. Bruyndonckx, J-J .Quisquater and B. Macq ‘3-
place the watermark “rabbit” in “Lena”, takes into ac- patial Method for Copyright Labeling of Digital
count the average d u e of the intensity levels of the Images” proc. D E E workshop on Nonhear Signal
pixels which belong in a neigbourhood of a pixel which and Image processing, LPitas (ed) , Vol I, p.456,
is altered. This average is. quite a robust under noise, 1995.
filtering and compression. Numerical experiments show
N.Nikolaidis and LPitas “Copyright protection of
that the reconstructed watermark is recognized visibly
images using robust digital signatures” proc. of
if the watermarked image is affected by JPEG com-
ICASSP-96, Atlanta, USA, May 1996 (accepted).
pression up to 61. By using signal detection methods
we can get a reliable answer about the existence or not D.K. Arrowsmith and C.M.Place, “An Introduction
of a watermark even if the watermaked image has been to Dynamical systems”, Cambridge Univ. Press
affected quite strongly by filtering and JPEG compres- 1990.
sion peater than 1O:l.
I. Percival and F.Vivaldi, “Arithmetical properties
of strongly chaotic systems”, Physica 25D, p.105-
5. REFERENCES 130, 1987.
F.Vivaldi, “Geometry of linear maps over finite
[I] I.J.Cox, J.Kilian, T.Leighton and T.Sha”oon fields”, Nonlinearity 5, p.133-147, 1992.
‘Secure Spread spectrum Watermarking for Multi-

240

You might also like