Professional Documents
Culture Documents
5, OCTOBER 2003
Abstract—In recent years, digital watermarking techniques watermarking, on the other hand, is a far more complex concept.
have been proposed to protect the copyright of multimedia data. It is most often used to identify copyright data such as author,
Different watermarking schemes have been suggested for images. distributor, etc. This paper focuses on this category, and the word
The goal of this paper is to develop a watermarking algorithm
based on the discrete cosine transform (DCT) and image seg- “watermark” will mean, by default, the invisible watermark.
mentation. The image is first segmented in different portions The most suitable data for watermarking are still images,
based on the Voronoi diagram and features extraction points. video, and audio [2]. It is important to point out that not all dig-
Then, a pseudorandom sequence of real numbers is embedded in ital data are suitable for watermarking, despite their capacity
the DCT domain of each image segment. Different experiments to be watermarked and, therefore, require some other means of
are conducted to show the performance of the scheme under
different types of attacks. The results show that our proposed protection. For example, executable files are not suitable for wa-
watermark scheme is robust to common signal distortions, termarking because they can easily be converted to a canonical
including geometric manipulations. The robustness against Joint format and thus lose the watermark. Another unsuitable media is
Photographic Experts Group (JPEG) compression is achieved for text, which has been watermarked simply by introducing slight
a compression ratio of up to 45, and robustness against average, shifts between characters and lines. The problem with this is
median, and Wiener filters is shown for the 3 3 up to 9 9
pixel neighborhood. It is observed that robustness against scaling that using a commercial optical-character-recognition (OCR)
was achieved when the watermarked image size is scaled down to package [1] can circumvent the watermark.
0.4% of its original size. The main contribution of this paper is to present a new
Index Terms—Discrete cosine transform (DCT), digital wa- watermarking scheme that is based on discrete cosine transform
termarking, Joint Photographic Experts Group (JPEG) model, (DCT) and Joint Photographic Experts Group (JPEG) model in
Voronoi diagram. the feature domain. It also gives an up-to-date overview of the
field of watermarking. Section II presents the main applications
I. INTRODUCTION and properties of watermarking. Section III elaborates on the
techniques of digital watermarking. The proposed watermarking
(a)
Fig. 7. Correlation output of watermark detector response of different Median filter size.
According to
(7)
(8a)
(8b)
for , and
Fig. 9. Correlation output of watermark detector response of successive compression ratios from 5 to 45 using JPEG.
Fig. 11. Correlation coefficient as a function of the percentage of the image area remaining.
a comparison with Cox algorithm will be provided. In the Following the watermark insertion, the images were cropped,
median filtering, the value of an output pixel is determined and the detection procedure was applied. A percentage of the
by the median of the neighborhood pixels. Median filtering is image is cropped from 10% to 90%. The watermarked image
able to remove the outliers in the image without reducing the cameraman is cropped, and the remaining percentage 50% of the
sharpness of the image. Fig. 6 show the results for the median watermarked image is displayed in Fig. 10. The corresponding
filtering, of size 9 9. The results show that the robustness correlation output at each cropping level is shown beside the re-
of our system still good even with larger sizes of the filters. maining image. The correlation coefficient as a function of the
This is shown in Fig. 7, where the effect of image filtering on percentage of the image area remaining is displayed in Fig. 11.
watermark detection as the output of correlation coefficient It can be concluded from this figure that the proposed system
versus the filter size is displayed. Also, this figure shows that method is robust enough to the cropping attack, even when only
when the watermarked image is watermarked based on the a small percentage of the image area remains. The correlation
proposed scheme then filtered using median filtering, it will coefficient for the proposed technique is high and above the de-
not have a severe impact on the watermarking robustness as tection threshold. This is because the watermark is inserted in
it has when it is watermarked based on Cox algorithm. each watermark segment as explained. Fig. 11 also demonstrates
The watermarked images are exposed to JPEG for different the superiority of our system compared to the Cox scheme. This
compression ratios (CRs). The watermarked image exposed to is because the watermark at the DCT watermark coefficients
JPEG of compression ratio 1:45 is shown in Fig. 8. The re- in the Cox algorithm is inserted globally throughout the image
sulting compressed image shows visible blocking artifacts as content, which leads to losing some of these coefficients while
displayed in the Figure. The correlation coefficients of the wa- the watermarked image is cropped.
termarking detector after compression using JPEG is presented
in Fig. 9. The JPEG compression attack results in compression
VI. CONCLUSION
ratios ranging from 1:1 (no compression) to 45:1. To achieve
compression, high frequency discrete cosine transform (DCT) To conclude, we have presented a new robust watermarking
terms can be eliminated without affecting the image quality, but scheme and demonstrated its superior performance using dif-
it might affect the integrity of the watermark information placed ferent experiments. The results of experiments show that this
in the high frequency terms. This is clear form Fig. 9 which re- approach is very promising, because it is robust to common
veals that the robustness declines as the watermarked image is image processing distortions. Our proposed system outperforms
compressed more. However, the proposed system robustness is the Cox algorithm. For the compression attacks, it is found that
better than Cox algorithm due to the distribution of the water- the robustness against JPEG compression is achieved for a com-
mark in all DCT coefficients of the host image. pression ratio (CR) of up to 45. Moreover, robustness against
SUHAIL AND OBAIDAT: DIGITAL WATERMARKING-BASED DCT AND JPEG MODEL 1647
average, median and Wiener filters is shown for the 3 3 up to Mohammad S. Obaidat (SM’90) received the M.S.
9 9-pixel neighborhood. Also, the proposed system is inher- and Ph.D. degrees in computer engineering, with a
minor in computer science, from the Ohio State Uni-
ently resistant to geometric manipulation. This is because we versity, Columbus.
are utilizing the robust extracted features, which are covariant to He is currently a tenured Full Professor of com-
these geometric transformations. It is observed that robustness puter science at Monmouth University, West Long
Branch, NJ. Among his previous positions are Chair
against scaling was achieved when the watermarked image size of the Department of Computer Science and Director
is scaled down to 0.4 of its original size. Finally, we have shown of the Graduate Program at Monmouth University
that cropping attack is not effective in destroying the watermark. and Faculty Member at the City University of New
York. He has received extensive research funding
and has published over 270 refereed technical articles in refereed scholarly
REFERENCES international journals and proceedings of refereed international conferences.
[1] C. Busch, W. Funk, and S. Wolthusen, “Digital watermarking: From He is author of the book Fundamentals of Performance Evaluation of Computer
concepts to real-time video applications,” IEEE Comput. Graphics Ap- and Telecommunications Systems (New York: Wiley, 2003). He is the coauthor
plicat., vol. 19, pp. 25–35, Jan./Feb. 1999. of the two books Wireless Networks and Multiwavelength Optical LANs (New
[2] M. D. Swanson, M. Kobayshi, and A. H. Tewfik, “Multimedia data- York: Wiley, 2003) and coauthor of the book Security of E-based Systems (Cam-
embedding and watermarking technologies,” Proc. IEEE, vol. 86, pp. bridge, U.K.: Cambridge University Press 2004). He is the Co-Editor of the
1064–1087, June 1998. book Applied System Simulation: Methodologies and Applications (Norwell,
[3] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proc. MA: Kluwer, 2003). He has served as a Consultant for several corporations and
IEEE, vol. 87, pp. 1079–1106, July 1999. organizations worldwide. He is the Chief Editor of the International Journal
[4] C.-Y. Lin and S.-F. Change. Multimedia authentication. pre- of Communication Systems. He is also a Technical Editor of Simulation:
sented at Proc. SPIE Int. Conf. Security and Watermarking Transactions of the Society for Modeling and Simulations (SCS) International
of Multimedia Contents. [Online]. Available: http://www.ctr.co- TSCS. He is an Associate Editor/Editorial Board Member of seven other
lumbia.edu/~cylin/auth/mmauth.html. refereed scholarly journals, including Elsevier’s Computer Communications
[5] Summaries of current projects: Content-based image/video copy- Journal and Journal of Computers and Electrical Engineering and Kluwer’s
right protection and authentication (1999, Oct.). [Online]. Available: Journal of Supercomputing. He has guest edited several special issues of the
http://www.ee.columbia.edu/~elylin/auth/mmauth.html. Simulation Journal and of Elsevier’s Computer Communications Journal,
[6] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spec- Performance Evaluation Journal, and Journal of Computers and Electrical
trum watermarking for multimedia,” IEEE Trans. Image Processing, vol.
Engineering. He is the Founder of the International Symposium on Perfor-
6, pp. 1673–1687, Dec. 1997.
[7] R. Gonalez and P. Wintz, Digital Image Processing, Second mance Evaluation of Computer and Telecommunication Systems (SPECTS)
ed. Reading, MA: Addison Wesley, 1987. and has served as the General Chair of SPECTS’98, SPECTS’99, SPECTS’01,
[8] P. Wolfgang and E. Delp, “A watermark for digital images,” in Proc. SPECTS’02, and SPECTS2003. He is the Founder and First Chairman of the
IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, SCS Technical Chapter (Committee) on Performance Evaluation of Computer
pp. 219–222. and Telecommunication Systems. He has been invited to lecture and give
[9] A. Bors and I. Pitas, “Image watermarking using DCT domain keynote speeches worldwide. His research interests include performance
constraints,” in Proc. IEEE. Int. Conf. Image Processing, Lausanne, evaluation of computer and telecommunications systems, modeling and
Switzerland, Sept. 1996, pp. 231–234. simulation, telecommunications and computer networking, wireless networks,
[10] M. Swanson, B. Zhu, and A. Tewfik, “Transparent robust image wa- high performance and parallel computing/computers, applied neural networks
termarking,” in Proc. IEEE. Int. Conf. Image Processing, Lausanne, and pattern recognition, computer security, instrumentation and measurement,
Switzerland, Sept. 1996, pp. 211–214. and speech processing. He has served as the Sceitific Advisor/Program Leader
[11] J. J. K. O’Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking for the World Bank/UNDP Workshop on Fostering Digital Inclusion which is
digital images for copyright protection,” Proc. Inst. Elect. Eng. Vision, part of the MDF-4.
Signal, and Image Processing, vol. 143, no. 4, pp. 250–256, Aug. 1996. Dr. Obaidat is a Fellow of the Society for Computer Simulation International
[12] J. Puate and F. Jordan. Using compression scheme to embed and a member of the Board of Directors of the Society for Computer
a digital signature into an image. [Online]. Available: Simulation International and is currently the Vice President of Conferences
http://iswww.epfl.ch/~jordan/watremarking.html. of the Society for Modeling and Simulation International (SCS). He is
[13] W. Guan and S. Ma, “A list-processing approach to compute Voronoi an Associate Editor/Editorial Board Member of three IEEE Transactions.
diagrams and the Euclidean distance transform,” IEEE Trans. Pattern He has also guest edited two special issues of the IEEE TRANSACTIONS
Anal. Mach. Intell., vol. 20, July 1998. ON SYSTEMS, MAN AND CYBERNETICS (SMC), one titled Neural Network
[14] M. Berg, M. Kreveld, M. Overmars, and O. Schwarzkopf, Computa-
Applications and the other titled Learning Automata: Theory, Paradigms,
tional Geometry: Algorithms and Applications. Berlin, Germany:
and Applications. He has served as the Steering Committee Chair, General
Springer, 1997.
[15] R. Klein, Concrete and Abstract: Voronoi Diagrams. Berlin, Germany: Chair, Program Chair, or Vice Chair of many international conferences,
Springer-Verlag, 1987. including the 1995 IEEE International Conference on Electronics, Circuits,
[16] T. Tommasini, A. Fusiello, E. Trucco, and V. Roberto, “Marking good and Systems, the 1996 IEEE International Phoenix Conference on Computers
features track better,” in IEEE Conf. Computer Vision and Pattern and Communications, the 1997 and 1998 IEEE International Performance,
Recognition, June 1998, pp. 178–183. Computing, and Communications Conference, the 1997, 1998, 1999, 2000,
2001, 2002, and 2003 Summer Computer Simulation Conference, the 1997
IEEE International Conference on Computer Communications and Networks,
and the 2001 International Conference on Parallel Processing. Between 1994
Mohamed A. Suhail (M’02) received the Ph.D. degree in telecommunications and 1997, he served as Distinguished Speaker/Visitor of the IEEE Computer
and electronics, with a minor in multimedia and information technology, from Society. Since 1995, he has been serving as an ACM Distinguished Lecturer.
the University of Bradford, U.K., and the MS. dgree in electrical engineering Between 1996 and 1999, he served as an IEEE/ACM program evaluator of
from King Fahd University of Petroleum and Minerals, Saudi Arabia. the Computing Sciences Accreditation Board/Commission (CSAB/CSAC).
He has has published over 16 refereed technical articles in refereed scholarly Recently, he was awarded a Nokia Research Fellowship and he has received
international journals and proceedings of refereed international conferences. a recognition certificate from the IEEE.
He contributed to a book entitled Trends in Industrial and Applied Mathe-
matics (Dordrecht, MA: Kluwer, 2002). His research interests include signal
processing, watermarking algorithms and applications, wavelet applications,
applied neural networks and pattern recognition, and computer security.