Professional Documents
Culture Documents
17
ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008
scaling factor and added to the SV of the host image. The In section 2 SVD Transformation is discussed. The
attacks used are JPEG (QF =25 and 10), and 3x3 low proposed method is introduced in section 3. In section 4
pass filter. But this method is non-blind in nature. In the experimental results are shown. The conclusions are
2002, Sun et al. Proposed an SVD and quantization given in section 5.
based watermarking scheme where in D component with
a diagonal matrix is explored for embedding. The basic 2. Singular Value Decomposition
mechanism used is the quantization of the largest SVD is an algorithm of matrix transformation based on
component with a fixed constant integer, called eigen vector. SVD is a mathematical tool used to analyze
Quantization coefficient. A trade-off can be achieved matrices. In SVD, a matrix is decomposed into three
between transparency and robustness by varying the matrices of same size. Let A be m x n matrix with m ≥ n.
quantization coefficient. However, the method failed in One form of singular value decomposition of A is
extracting the watermark with zero error rate. The A= UTDV. Here U and V are orthogonal and D is
original watermark image and retrieved watermark image square diagonal. That is, UUT = Irank(A), VVT= Irank(A), U is
are not exact. Later in 2005, Chang et al. Proposed a rank(A) x m, V is rank(A) x n and
watermarking scheme based on SVD domain. Later in
2005 Chang et al. proposed a watermarking scheme
⎛σ 1 0 . . . 0 0 ⎞
based on SVD domain. They explored U matrix for ⎜ ⎟
watermark embedding. They used a 512x512 Lena, ⎜ 0 σ2 . . . 0 0 ⎟
Airplane and Baboon as host images and two watermark ⎜ . . . . . . . ⎟
images IEEE logo and CCU logo of 32x32 size. Here U ⎜ ⎟
D = ⎜ . . . . . . . ⎟
matrix is explored for data embedding. They modified
the absolute difference between two rows of U matrix. ⎜ . . . . . . . ⎟⎟
They identified that the positive relationships between ⎜
the rows of U matrix is preserved even after JPEG ⎜0 0 0 0 0 σrank ( A) − 1 0 ⎟
⎜ ⎟
compression. The attacks shown in their paper are only
⎝0 0 0 0 0 0 σrank ( A) ⎠
JPEG (QF=70), Gaussian Noise, Cropping, sharpening,
(1)
blurring and tampering. The watermarked image is of
is a rank(A) x rank(A) diagonal matrix. These diagonal
good quality. They embedded a 32x32 binary logo in a
entries σi' s are called singular values of A and their
512x512 image. There are two major issues with Chang
et al.’s method. The first one is, the watermark extraction number is equal to the rank of A. These singular values
is not complete. The error rate between the original satisfy the relation
watermark and extracted watermark is not zero. It is very σ 1 ≥ σ 2 ≥ σ 3......σrank ( A) > 0. (2)
close to zero. That means, the Normalized correlation Each singular value specifies the luminance of an image
coefficient is not ‘1’. If perfect extraction is required, layer while the corresponding pair of singular vectors
robustness has to be sacrificed. Both robustness and specifies the geometry of the image. For majority of the
perfect extraction (zero error rate) cannot be achieved attacks, the change in the largest singular value is very
simultaneously. The reason for this can be attributed to small.
the nature of U matrix elements, which are real numbers The concept of dither quantization was
of magnitude less than ‘1’. Any modification of U matrix introduced to digital watermarking community by Chen
values beyond the threshold value will affect the and Wornell. Dither quantizers are set of basic
extracted watermark. The second issue is in the process quantizers. Each quantization cell in the set is
of complex block selection. A block is said to be a constructed from a basic quantizer. The basic quantizer is
complex block if the block’s diagonal matrix contains shifted to get the reconstruction point. The shift depends
more number of non zero coefficients. It has been on the watermark bit. The basic quantizer is a uniform
observed that for majority of the blocks, the number of scalar quantizer with a fixed step size t. A quantizer in
non zero coefficients is same. So, it is difficult to the ensemble consists of two quantizers shifted by t/2
identify a block as complex block based on the number of with respect to each other. In the proposed algorithm the
non zero coefficients in the diagonal matrix of the block largest singular values of each 8 x 8 block are quantized
in the host image. In this paper, we propose an using either quantizer 1 or quantizer 2 which depends on
algorithm which addresses both the issues. The first issue watermark bit to be embedded. The quantized value is the
is resolved by exploring the diagonal matrix using dither center of the quantizer.
quantization [25] and the second one is resolved by
identifying a complex block based on the number of
edges in a block. We define a block as a complex block if 3. The Proposed Scheme
the block contains more number of edges. So an edge In the proposed scheme diagonal matrix (D) is used for
detection algorithm [26] is applied for this purpose prior watermark embedding. Any modification of D
to watermark embedding. The proposed method is highly component degrades the perceptibility of the
robust and the perceptibility of the image is better than watermarked image. To improve perceptibility, the
Chang et al.’s method. In terms of robustness also our watermark is embedded in some selected complex blocks
method is superior to Chang et al.’s method as our only. The strategy for selecting a block is based on the
method can survive to many attacks. number of edges in a block. A block is qualified as a
complex block if the number edges in a block is greater
18
ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008
than some predefined threshold. The watermark 5. A look-up table is formed with the entries
embedding algorithm is as follows:
[[dmin-t dmin],[dmin dmin+t],…. …..[dmax dmax+t]]
1. Cany’s edge detection algorithm is applied to the
entire host image of size 512x512. [6]
2. In each 8x8 non-overlapping block, number of edges is 6. The dlarge value of each selected block is
computed. checked for its position in the look-up table.
3. Blocks are arranged based on descending order of 7. The watermark bit is ‘1’ if dlarge lies in the
the number of edges in each block. The first 1024 dl + dh
interval dl to .
(32x32) blocks having more number of edges are 2
selected and indexed for watermark embedding. [7]
8. The watermark bit is ‘0’ if dlarge lies in the
4. SVD transformation is applied on each individual
dl + dh
selected block. interval to dh
2
5. A matrix Dlarge, is formed with largest singular values [8]
of each block. The size of the Dlarge is 32 x32. The embedding methodology and extraction
technique are summarized in the flow chart
6. The maximum and minimum values of Dlarge are (Figure 1(a) & Figure 1(b)).
represented as dmax and dmin respectively. The range
[dmax dmin] is divided into uniform intervals [dl dh] of Host Image
width t.
[[dmin-t dmin], [dmin dmin+t],…. ……..[dmax dmax+t]] Apply Edge
Detection
[3]
7. For each selected block, identify the interval j to
Non-overlapping
which the block belongs, based on its dlarge value,
block Decomposition
and modify it as:
19
ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008
20
ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008
5. Conclusions
In this paper, a watermarking scheme based on Singular
Value Decomposition, dither quantization and edge
(a) (b) (c)
detection is proposed. The proposed method is highly
Figure 11 (a). Gamma correction (gamma=0.9)
robust and can survive many image processing attacks.
(b) Cropping (1/16th top left corner) (c) Image Tampering
The quality of the watermarked image is good in terms of
perceptibility and PSNR (47.02dB). The proposed
algorithm is shown to be robust to rotation, low pass
Table 1. Performance Comparison with Chang et al.’s
filtering, resizing, JPEG compression, JPEG2000
Method
compression, salt&pepper noise attack, row column
blanking, row column copying attack, cropping, bit plane
NC Value NC Value removal, image tampering and gamma correction. For
Type of Attack Chang et Proposed salt & pepper noise attack and row column blanking
al.’s Method Method attack, Chang et al.’s method is superior to our method.
0.5333 0.7422 The proposed method is superior to Chang et al.’s
Rotation 0.6874
0.4988 method in terms of NC value of the extracted watermarks.
(in degrees)
0.4712 0.5889 PSNR of the watermarked image is comparable to Chang
(10,20,40,60)
0.4856 0.6031 et al.’s method. In our future work, we will investigate
Low pass in embedding multiple watermarks in D and U matrices
Filtering 0.0265 0.4890 so that the watermark image can survive to more number
3x3 Kernel of image attacks.
Resizing 0.8155
0.2492 6. References
512-256-512
JPEG 0.1616 0.4732 [1] N.F. Johnson and S.C.Katezenbeisser, A survey
Compression 0.0919 0.9245 of steganographic techniques in Information
(Quality Factor) Techniques for steganography and digital
0.1729 1.0000
30,40,60,100 watermarking, Eds. Northwood, Artech House,
0.9953 1.0000 December, 1999.
JPEG2000 0.3323 0.6502 [2] Mohamed Kallel and Mohamed Salim
Compression 0.2819 0.9953 Bouhlel and Jean-Christophe Lapayre Improved
(Quality Factor) 0.8765 1.0000 Tian’s Method for Medical Image Reversible
5,10,30,50. 0.8989 1.0000 Watermarking GVIP Journal, Volume 7, Issue 2,
pp.1-5, 2007.
21
ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008
[3] I.J.Cox, J.Kilian, T.Leighton and T.Shamoon, of 45th IEEE Midwest Symposium on Circuits and
Secure Spread Spectrum Watermarking for Systems, Tulsa, OK, pp. 264-267, 2002.
Multimedia, IEEE Transactions on Image [19] E.Ganic and A.M. Eskiciogulu et al. Robust SVD-
Processing, 6(12), 1673-1687, December, 1997. DCT domain Image Watermarking for copyright
[4] C.I.Podilchuk and E.J.Delp, Digital Watermarking: Protection: Embedding data in All Frequencies.
Algorithms and Applications, IEEE Signal 13th European Signal Processing Conference
Processing Magazine, pp.33-46, July 2001. (EUSIPCO 2005), Antalya, Turkey, September 4-
[5] I.J.Cox, M.L.Miller, and J.A. Bloom, “Digital 8, 2005.
Watermarking”, Morgan Kaufmann Publishers, [20] E.Ganic and A.M. Eskiciogulu et.al., Robust
2002. embedding of Visual Watermarks using DWT-
[6] Mohamed Kallel and Mohamed Salim SVD Journal of Electronic Imaging, October-
Bouhlel and Jean-Christophe Lapayre A new December, 2005.
Multiple Watermarking Scheme in Spatial Field [21] Sun, R., Sun, H., Yao, T., A SVD and quantization
GVIP Journal, Volume 7, Issue 1, pp.37-42, 2007. based semi-fragile watermarking technique for
[7] Mehul, S. Raval and Priti P. Scalar Quantization image authentication. Proc. IEEE International
Based Multiple Patterns Data Hiding Technique Conf. Signal Process. 2. 1592-95, 2002.
for Gray Scale Images, GVIP Journal, Volume 5, [22] Y. Yongdong Wu. On the Security of an SVD
Issue 9, pp.55-61, December 2005. based Ownership Watermarking IEEE transactions
[8] Barni, F. Bartolini and A. Piva. A DCT domain on Multimedia, Vol 7. No.4, August, 2005.
system for robust image watermarking. IEEE [23] H.C.Andrews and C.L.Patterson, Singular value
Transactions on Signal Processing. 66, 357-372, Decomposition (SVD) Image Coding, IEEE
1998. Transactions on Communications 24(4), April
[9] W.C.Chu, DCT based image watermarking using 1976, pp.425-432.
sub sampling. IEEE Trans Multimedia 5, 34-38, [24] P.Waldemar and T.A.Ramstad, Hybrid KLT-SVD
2003. Image Compression, IEEE International Conf on
[10] M.Barni, M., Bartolini, F., V., Piva, A., Improved Acoustics, Speech and Signal Processing, Vol.4,
wavelet based watermarking through pixel-wise Munich, Germany, April 21-24, 1997, pp.2713-
masking. IEEE Trans Image Processing 10, 783- 2716, 1997.
791, 2001. [25] Brian Chen and G.W.Wornell, Digital
[11] Y. Wang, J.F.Doherty and R.E.Van Dyck, A watermarking and information embedding using
wavelet based watermarking algorithm for dither modulation. Proceedings of the IEEE
ownership verification of digital images, IEEE workshop on Multimedia Signal Processing
Transactions on Image Processing, Volume 11, (MMSP-98), Redondo Beach, CA, December
No.2, pp.77-88, February 2002. 1998.
[12] Karras D.A. A Second Order Spread Sprectrum [26] Canny, John. A Computational Approach to Edge
Modulation Scheme for Wavelet Based Low Error Detection, IEEE Transactions on Pattern Analysis
Probability Digital Image Watermarking., GVIP and Machine Intelligence,. Vol. PAMI-8, No. 6, pp.
Journal, Volume 5, Issue 3, February 2005. 679-698, 1986.
[13] G.S.El-Taweel and H.M. Onsi and M.Samy and
M.G. Darwish. Secure and Non-Blind
Watermarking Scheme for Color Images Based on
DWT, GVIP Journal, Volume 5, Issue 4 , pp. 1-5,
April 2005.
[14] Chin-Chen Chang, Piyu Tsai and Chia-Chen Lin,
2005 SVD based digital image watermarking
scheme. Pattern Recognition Letters 26, 1577-
1586, 2005.
[15] Chung, K.L., Shen, C.H., Chang, L.C., A Novel
SVD and VQ-based image hiding scheme. Pattern
Recognition Letters, 22, 1051-58, 2001.
[16] R.Liu, T.Tan, An SVD-based watermarking
scheme for protecting rightful ownership. IEEE
Trans. Multimedia, vol.4, no.1, pp, 121-128, 2002.
[17] V. I. Gorodetski, L. J. Popyack, V. Samoilov and
V. A. Skormin, SVD-based Approach to
Transparent Embedding Data into Digital Images,
International Workshop on Mathematical Methods,
Models and Architectures for Computer Network
Security (MMM-ACNS 2001), St. Petersburg,
Russia, May 21-23, 2001.
[18] D. V. S. Chandra, Digital Image Watermarking
Using Singular Value Decomposition, Proceedings
22
ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008
Biographies
B.Chandra Mohan is currently B.N.Chatterji is a former
working as Professor in ECE Professor in E&ECE
Department, Bapatla Engineering Department IIT, Kharagpur. He
College, Bapatla, India. He is received B.Tech. and Ph.D.
working towards his Ph.D.at (Hons.) from E&ECE
JNTU College of Engineering, Department IIT, Kharagpur in
Kakinada, India. He received his 1965 and 1970, respectively.
M.Tech from Cochin University He has served the Institute
of Science & Technolgoy, under various administrative
Cochin, India. He has fifteen capabilities as Head of
years experience of teaching undergraduate students and Department, Dean (Academic), etc. He has chaired many
post graduate students.His research interests are in the international and national symposium and conferences
areas of image watermarking, and image compression. organized in India and abroad, apart from organizing 15
short term courses for Industries and Engineering college
teachers. He has guided 35 Ph.D. scholars. Presently, he
S. Srinivas Kumar is currently is active in research by guiding three research scholars.
Professor and HOD in ECE He has published more than 150 papers in reputed
Department, JNTU College of international and national journals apart from authoring
Engineering, Kakinada, India. three scientific books. His research interests are low-level
He received his M.Tech. from vision, computer vision, image analysis, pattern
Jawaharlal Nehru Technological recognition and motion analysis.
University, Hyderabad, India.
He received his Ph.D. from
E&ECE Department IIT,
Kharagpur. He has nineteen
years experience of teaching undergraduate and post-
graduate students and guided number of post-graduate
theses. He has published 15 research papers in National
and International journals. Presently he is guiding five
Ph.D students in the area of Image processing. His
research interests are in the areas of digital image
processing, computer vision, and application of artificial
neural networks and fuzzy logic to engineering problems.
23