• Aucun résultat trouvé

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 5

we define the weighted Krawtchouk polynomial parameters as

244

pforKaand asqforKb withp, q∈(0, 1).

245

The corresponding inverse FrKT can be generated as

246

g=KaQa,bKb. (53) From (53), it can be observed that there are two more extra

247

parameters(a, b) in the transformation when compared with

248

the traditional 2-D Krawtchouk transform. They come in

addi-249

tion to the two parameters(p, q)in the weighted Krawtchouk

250

polynomials.

251

D. Property of Fractional Krawtchouk Transform Matrix

252

For the discrete fractional Fourier transform, the basic

re-253

quirements of the transform matrix to define the DfrFT are:

254

(1) unitary, (2) index additive, and (3) approximating the

con-255

tinuous Fourier transform [8], [9]. In this section, we will

inves-256

tigate some properties of FrKT transform matrixKadefined in

257

(48). As to the properties of DfrFT transform matrix, we will

258

present some properties ofKa, such as unitary, index additivity,

259

and reduction to the Krawtchouk transform when the order is

260

equal to 1.

261

It is obvious from (49) that ifa = 0,Dareduces to the

iden-262

tity matrix and the FrKT to the identity operator. Moreover,

263

ifa = 1,Da=Dand then the FrKT is reduced to the

tradi-264

tional Krawtchouk transform. We focus on the unitary and index

265

additivity properties of FrKT transform matrix in the following.

266

Property 7: Additivity

267

KaKb =Ka+b. (54) Proof: From (48) we have

268

KaKb =VDaVT

VDbVT

=VDaDbVT. (55) Since it follows from (49) that

269

DaDb =Da+b. (56) Therefore, by substituting (56) into (55), we have

270

KaKb =VDa+bVT =Ka+b. (57) The additivity property is thus shown.

271

Property 8: Unitarity

272

K−a= (Ka)−1. (58) The proof of property 8 can be achieved by makingb = −a

273

in (54) and noticing the fact thatK0 = I.

274

IV. APPLICATION TOIMAGEWATERMARKING 275

The DfrFT has been applied in many fields such as image

276

fusion [28], image copy-move forgery detection [29] and image

277

encryption [30]. The proposed FrKT can also be applied to these

278

fields. Due to the limited paper length, our objective is only to

279

provide a watermarking illustration. A brief introduction is

pro-280

vided and we refer the interested readers to recent reviews [31],

281

[32]. Schematically, digital image watermarking is a technique

282

mainly devoted to the protection of intellectual property rights

283

by embedding a digital watermark (or a message) into the

im-284

ages. The watermark is robustly and imperceptibly embedded

285

into the host image so as to allow for example verifying the 286

origin and the destination of the data [33]. Image watermarking 287

techniques can be classified into two categories: the spatial do- 288

main methods and the transform domain methods [34]. Because 289

space-based approaches are relatively weak in case of image at- 290

tacks (i.e. image filtering, compression, etc.), transform domain 291

methods have been more extensively investigated. They include 292

for instance the discrete Fourier transform (DFT) [35], discrete 293

cosine transform (DCT) [36], [37], discrete wavelet transform 294

[38], [39], fractional Fourier transform [40], quaternion Fourier 295

transform [41], SVD transform [42], [43], and moment trans- 296

form [44]. 297

In [45], the Krawtchouk transform coefficients have been 298

used as host coefficients to embed the watermark owing to their 299

robust behavior. As a generalization of the Krawtchouk trans- 300

form, FrKT has two additional fractional orders. By adjusting 301

the fractional orders in the transform, different transform domain 302

coefficients can be obtained. So we use the FrKT coefficients to 303

embed the watermark and the fractional orders can then serve 304

as extra secret keys to enhance the security of the watermark- 305

ing scheme (refer to [46] for more details). In the following, 306

the block based watermarking approach described in [45] has 307

been applied in the FrKT domain. It has the following features 308

[47]: (i) partitioning the host image into small blocks fulfills 309

the un-detectability and imperceptibility requirements; (ii) the 310

ability to handle each block separately allows using multiple 311

secrete keys for secret block selection, improving consequently 312

the watermarking security; (iii) the watermark capacity (i.e. the 313

size of the embedded message expressed in bits of message per 314 image pixel) will vary from one block to another according to 315

their properties while establishing a compromise between the 316

watermark robustness and imperceptibility. The watermark em- 317

bedding and extraction procedures are shown in Figs. 1 and 2, 318

respectively. 319

A. Watermark Embedding Procedure 320

Let us consider an original grayscale image g of N×N 321

pixels, and anl×lwatermarkW(see Fig. 3). It is embedded 322

according to the following steps: 323

Step 1: To enhance the security of the scheme and eliminate 324

the pixel correlation in spatial domain, the watermark is scram- 325

bled fromWintoW1at first with the Arnold transform, which 326

is defined as follows [48]: 327

x∗ where (x, y),(x∗, y∗)are the coordinates of the original and 328

scrambled watermark pixels, respectively. The scrambling pa- 329

rametersc, d, eandf are such that 330

c d e f

= 1. (60) We choosec = 1, d = 1, e = 1, f = 2, s = 0 andt = 331

0 in the following. 332

Step 2: Divide the original image g into 8×8 non- 333

overlapping blocks. Thus, there will beN/8 × N/8blocks 334

IEEE Proof

Fig. 1. The diagram for watermark embedding.

Fig. 2. The diagram for watermark extraction.

Fig. 3. Some original images - (a) to (j) - and watermarks - (k) and (l) - from our test database.

for the original image, wherexdenotes the lower integer part

335

ofx. To ensure the security of the watermark, we secretly select

336

l2(l≤N/8) blocks. The secret keyKEY1corresponds to the

337

position of the selected blocks. It will be necessary to know it

338

to extract the watermark.

339

Step 3: Perform FrKT on each block. The transform matrix

340

of one block is denoted by C. Note that the two parameters

341

p, q, and the fractional orders a and b are extra key values that

342

have also to be known at the extraction stage. These values are

343

denoted asKEY2.This contributes to reinforce the security of

344

the watermarking scheme. For each block, the element (k1, k2)

345

in the real partC0ofCis used to embed one bit of the watermark

346

using the Dither modulation method [49], [50]:

347

|C0(k1, k2)|

=

⎧⎪

⎪⎩

×round

|C0(k1,k2)|

+Δ2, if W1(i, j) = 1 2Δ×round

|C0(k1,k2)|

Δ2, if W1(i, j) = 0 (61)

where Δ is the quantization step controlling the embedding

348

strength of the watermark bit, | · | is the absolute operator,

349

round(·) denotes the rounding operation to the nearest

inte-350

ger, W1(i, j)is the scrambled watermark bit at the position

351

(i, j)andC0 is the modified block.

352

Step 4: The inverse FrKT is applied on each modified block 353

C0to obtain the watermarked image. 354

B. Watermark Extraction Procedure 355

To extract the watermark from a received imageg, one has 356 to know the secret keys(KEY1,KEY2)and then to apply the 357

watermark extraction procedure as follows: 358

Step 1: Divide the test imageginto 8×8 non-overlapping 359

blocks, and compute the FrKT coefficients of each block. 360

Step 2: For one block FrKT coefficients C, the element 361

(k1, k2)in the real partC0 is used to extract one bit of water- 362

mark at position(i, j)using the minimum distance decoder in 363

the following way: 364

W1(i, j) = argσ∈{0,1}min(|C0(k1, k2)|σ− |C0(k1, k2)|) (62) whereW1is the extracted scrambled watermark, and 365

|C0(k1, k2)|σ=

⎧⎪

⎪⎩

×round

|C0(k1,k2)|

+Δ2, if σ= 1 2Δ×round

|C0(k1,k2)|

Δ2 ,if σ= 0 (63) Step 3: Perform the inverse Arnold transform onW1to obtain 366

the extracted watermark informationW. 367

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 7

Finally, the extracted watermarkWcan be used to identify

368

the ownership and copyright.

369

V. EXPERIMENTALRESULTS 370

Experiments have been carried out to assess the validity of

371

the watermarking scheme using FrKT for image copyright

pro-372

tection. To conduct these experiments, we consider 96 gray

373

images of size 512×512 from the image database of the

Com-374

puter Vision Group, University of Granada [51]. It can be seen

375

from the embedding procedure that the maximum watermark

376

capacity, which can be embedded into the host image with size

377

N×N, is N2. We used two binary images of size 64×64

378

from the MPEG-7 database [52]: “Deer” and “Cup” as

water-379

marks in the experiments. That is, 4096 bits were embedded

380

into each host image. Some of the test images and watermarks

381

are shown in Fig. 3. One bit of watermark is embedded into

382

each block of the original image. The first row and first

col-383

umn position in the transformed block is selected to embed

384

the watermark due to the fact the low order Krawtchouk

trans-385

form coefficients have been shown more robust to attacks [45].

386

This FrKT based watermarking scheme is compared with the

387

Krawtchouk transform approach reported in [45], as well as

388

the watermarking using DCT [37], DWT [38], LWT [39], SVD

389

[42], and Tchebichef moment (TM) [44], the discrete fractional

390

cosine transform (DfrCT), the discrete fractional sine transform

391

(DfrST), and DfrFT. In the following experiments, the

parame-392

ters in the Krawtchouk polynomial arep = q = 0.5. The

wa-393

termark imperceptibility is evaluated quantitatively through the

394

Peak Signal-to-Noise Ratio (PSNR) defined as [53]

395

PSNR= 10log102552

MSE (64)

where MSE is the mean square error between the original image

396

g(x, y)and the watermarked imagegw(x, y), given by

397

MSE=

N−1 x= 0

N−1 y= 0

(g(x, y)−gw(x, y))2. (65) The performance in terms of watermark robustness is

mea-398

sured through the bit error rate (BER) expressed by [43]

399

BER= l

i= 1

l

j= 1|W(i, j)−W(i, j)|

l×l (66)

where W is the extracted watermark and W is the original

400

binary watermark of sizel×l.

401

In a first experiment, the watermark imperceptibility was

402

tested and we determined the proper quantization step for

wa-403

termark embedding (see Dither modulation in Section IV-A).

404

Using the 96 original images and the 2 watermarks, 192 host

405

image and watermark pairs are generated. For each pair, the

406

watermark is embedded with the fractional ordera = b = 0.4

407

and the quantization step is increasing from 1 to 45 with an

in-408

crement equal to 1. Then, the PSNR of the watermarked image

409

is calculated. Fig. 4 shows the average PSNR value of the

water-410

marked images of the 192 pairs for these different quantization

411

steps. We also made a comparison with the Krawtchouk

trans-412

form based watermarking scheme. It can be seen from Fig. 4 that

413

Fig. 4. Average PSNR value obtained over our image test database depending on the watermark embedding strength (i.e. the quantization step of the dither modulation).

the PSNR value of the watermarked image decreases with the 414

increase of the quantization step. Moreover, the PSNR value of 415

the watermarked image is higher when using the FrKT transform 416

instead of the Krawtchouk transform for the same quantization 417

step. Generally, a larger quantization step is required for better 418

robustness, meanwhile the quality of watermarked image de- 419

creases. To get watermark imperceptibility, the PSNR value is 420

expected to be higher than 40 dB. Therefore, the quantization 421

step of the Krawtchouk transform based scheme could be se- 422

lected to 25, leading to an average PSNR value of 40.72 dB. 423

For the FrKT, with quantization steps 25 and 40 respectively, 424

the PSNR averages of the watermarked images are equal to 425

46.43 dB and 42.25 dB. 426

A second experiment was conducted to evaluate the robust- 427

ness of these two approaches with fractional ordera =b = 0.4, 428

and the quantization step defined in the previous experiment us- 429

ing all original images and the two watermarks shown in Fig. 3. 430

The watermark attacks included the most common signal pro- 431

cessing and geometric attacks (see Table I). Each watermarked 432

image used in the previous experiment was distorted consid- 433

ering various attacks. Table II shows some examples of the 434

extracted watermarks and their corresponding BER values. The 435

change of BER for the geometric attack is due to the inter- 436

polation error and the truncation error that occur when cor- 437

recting the geometric attack (i.e. inversely transforming the 438

geometric transformation to neutralize the attacks [41]). The 439

mean BER values of the proposed FrKT and Krawthouk trans- 440

form based approaches are displayed in Fig. 5. The comparison 441 of the FrKT based watermarking method with DCT, DWT, LWT, 442

SVD, TM, DfrST, DfrCT, and DfrFT based algorithms is shown 443

in Fig. 6. To make a fair comparison, the quantization steps in 444

these methods were adjusted such that the PSNR of the water- 445

marked image is about 40 dB. To consider the situation when 446

the fractional orders are different, we also make a comparison 447

with the proposed watermarking scheme with fractional orders 448

(a, b) = (0.4,0.5)in Fig. 5. It can be observed from Figs. 5 449

and 6 that: (1) The BER values increase with the enhance- 450

ment of the attack power of the filter, noise, JPEG compres- 451

sion, and sharpening attacks. (2) By increasing the quantization 452

strengthΔfrom 25 to 40, the proposed schemes are much more 453

IEEE Proof

TABLE I

IMAGEATTACKS AND THEIRPARAMETERIZATION

TABLE II

SOMEEXAMPLES OFEXTRACTEDWATERMARKS AND THEIRBER VALUESUNDERDIFFERENTATTACKS

robust to different attacks. (3) The FrKT based schemes with

454

(a, b) = (0.4,0.4) and(a, b) = (0.4,0.5)have lower BER

455

values for most attacks than the Krawtchouk one, that is, the

456

watermarking scheme using FrKT provides a better robustness

457

by a sound selection of the fractional orders. Some better choice

458

of these parameters will be presented in the last experiment of

459

this section. (4) The proposed scheme can achieve better

wa-460

termark robustness in most attack situations than the classical

461

algorithms, such as the DCT, DWT, LWT, SVD, DfrST, DfrCT,

462

and DfrFT based algorithms. All the methods are not robust to

463

the shifting attack because they used a block based principle,

464

and a change of the block position in the extraction procedure

465

leads to the failure of the watermark extraction. Moreover, the 466

proposed approach and most of the compared methods are not 467

robust to the histogram equalization attacks because they mod- 468

ify the pixel values in each block. In contrast, the methods of 469

[37] and [39] are robust to the histogram equalization. We think 470

this is due to their embedding strategies. The difference between 471

two coefficients of adjacent blocks is used to embed the water- 472

mark bit in [37] and the watermark is embedded into the edge 473

part of the image in [39]. 474

The third conducted experiment shows that the watermark 475

security is enhanced by the fractional orders in the FrKT. The 476

objective here is to prevent the attackers from generating the 477

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 9

Fig. 5. Mean BER values of the FrKT and Krawtchouk transform based watermarking schemes under different attacks.

counterfeit key to extract the watermark. The Deer watermark

478

was thus embedded into the original images of Fig. 3(a) with

479

fractional ordersa = b = 0.4. In the extraction procedure, we

480

separately extract the watermark without attacks with fractional

481

ordersa = bincreasing from 0.2 to 2.0 by 0.2. The extracted

482

watermark BER values with various fractional orders are shown

483

in Fig. 7. As it can be seen, the BER of the extracted watermark

484

with wrong fractional orders is about 0.5. This indicates that the

485

watermark information is not properly extracted or equivalently

486

that, without the good parameter values, it is not possible to

487

access the embedded watermark. The watermark examples

dis-488

played in Fig. 7 confirm that any watermark information cannot

489

be recovered when using the wrong fractional orders.

490

In the last experiment, we analyze the influence of fractional

491

orders variation whena = bin the embedding and extraction

492

stage changes from 0.1 to 1 on the watermark imperceptibility 493

and robustness. The Deer watermark is separately embedded 494

into the 96 images using a quantization step equal to 25 and 495

40 respectively. Then, the PSNR of each watermarked image 496

is computed. Fig. 8 shows the average PSNR of the 96 images 497

while varying the fractional orders a=b from 0.1 to 1 by 0.1. 498

It can be seen that the smallest PSNR value corresponds to 499

the fractional ordersa = b = 1 when the FrKT reduces to the 500

Krawtchouk transform. Besides, the highest PSNR values (about 501

46 dB, much higher than the required 40 dB mentioned above 502

for imperceptibility) are obtained when a = b = 0.4 or 0.6. 503

To show the influence of the fractional orders on the robustness, 504

and to guide the choice of the fractional orders, the watermarked 505

images have been submitted to different attacks to which our 506 proposed method can better resist, such as filter, noise, JPEG, 507

IEEE Proof

Fig. 6. Mean BER values comparison of the proposed FrKT based watermarking method and some available watermarking algorithms.

Fig. 7. Extracted watermark and corresponding BER value with fractional orders different from the embedding stage in the extraction procedure (with a = b = 0.4 in the embedding procedure).

rotation, scaling, and sharpening shown in the second

ex-508

periment. Fig. 9 depicts the BER variations of the extracted

509

watermarks when using different fractional orders. One can

510

see for instance that FrKT achieves either better robustness

511

Fig. 8. Average PSNR values of watermarked image with Deer watermark under various fractional orders in FrKT (with quantization stepΔ = 25,40).

(filtering, noise and JPEG compression attacks) than the spe- 512

cial case Krawtchouk transform (a = b = 1) or similar perfor- 513

mance (scaling and rotation attacks). However, the BER values 514

corresponding to the fractional ordersa = b = 0.1 and 0.7 are 515

relatively high. This is because the absolute value of the modi- 516

fied FrKT coefficients under these orders are very small and can 517

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 11

Fig. 9. Average BER of extracted Deer watermark with various fractional orders used in FrKT of the embedding and extraction process under different attacks.

(a) Median filter 5×5, (b) Average filter 5×5, (c) Salt & Pepper noise with density 0.02, (d) Gaussian noise with variance 0.02, (e) JPEG compression with quality factor 30, (f) Rotation with angle 25o, (g) Scaling with factor 0.9, (h) Gaussian blur with standard derivation 1, (i) Sharpening with radius 2.

be easily changed by an attack. In fact, most of the FrKT

coeffi-518

cients are in the interval(−Δ,Δ), which leads to the modified

519

value−Δ/2 if the watermark bit is 0 whileΔ/2 if the watermark

520

bit is 1. Subsequently, the watermark bit cannot be accurately

521

extracted from these modified coefficients in the watermark

ex-522

traction procedure. Moreover, it can be seen from Fig. 9 that the

523

BER of the extracted watermark from the watermarking using

524

quantization step 40 always achieves better results than that

us-525

ing quantization step 25. Notice that the BER for quantization

526

step 40 fora = b = 0.1 and 0.7 is relatively higher than for

527

quantization step 25. This is due to the fact that the watermark

528

bit 0 cannot be accurately extracted even if no attack is

per-529

formed on the watermarked image because of the small modified

530

coefficients. It can be observed from Fig. 9 that a better

water-531

mark robustness can be achieved by an appropriate choice of

532

the fractional orders, such asa = b = 0.3, 0.4,0.6,0.8,0.9.

533

However, we have pointed out in Fig. 5 that a better performance

534

can also be achieved ifa = b, such asa = 0.4, b = 0.5.

Nev-535

ertheless, up to now, it is not easy to give a standard method for

536

choosing the fractional orders. We plan to study the optimization

537

of fractional orders selection by means of adaptive

watermark-538

ing [43], [54]. Such technique can be further combined with the

539

approach reported in [55] on Human Visual System (HVS) in

540

order to adaptively determine the quantization step and to im- 541

prove the performance of the proposed watermarking scheme. 542

Beyond that, feature point detection can be applied to design a 543

local image watermarking system capable to face the watermark 544

shifting attack situation [56]. 545

VI. CONCLUSION 546

This paper makes the following main contributions: firstly, it 547

determined the eigenvalues and the corresponding multiplicity 548

of each eigenvalue of the FrKT transform matrix. Secondly, it 549 presented a method for deriving a set of orthonormal eigen- 550

vectors corresponding to each eigenvalue of the Krawtchouk 551

transform matrix. Lastly, the definition of FrKT from the eigen- 552

value decomposition of the transform matrix was given and 553

some important properties of FrKT were demonstrated, such as 554

the unitary, the index addition, and the approximation of the 555

Krawtchouk matrix with particular fractional orders. 556

For a first assessment of this theoretical study, we used a 557

watermarking application and we compared its performance 558

with the classical Krawtchouk transform and other transforms. 559

It has been shown that more watermark imperceptibility and 560

robustness under most attacks for the same capacity can be 561

IEEE Proof

expected by adjusting the fractional orders in FrKT. The optimal

562

choice of different fractional orders, the embedding position and

563

the quantization step will be considered in our future work.

564

APPENDIX 565

To prove Theorem 1, we need two Lemmas. Before giving

566

these two lemmas, we first define some notations and properties.

567

Letf(t)be a formal power series, the coefficients oftk in

568

f(t)are denoted as[tk]f(t). Letf(t)andg(t)be two formal

569

power series, then we have [57]:

570

binomial coefficients can also be represented as constant terms

574

In this context, if two variables x and y appear in the same

576

expression,CTxrepresents the constant term with respect to x,

577

andCTx,y represents the constant term with respect to x and y.

578

Lemma A1: Let M, n, and k be non-negative integers such

Lemma A1: Let M, n, and k be non-negative integers such

Documents relatifs