• Aucun résultat trouvé

Fractional Krawtchouk Transform With an Application to Image Watermarking

N/A
N/A
Protected

Academic year: 2022

Partager "Fractional Krawtchouk Transform With an Application to Image Watermarking"

Copied!
32
0
0

Texte intégral

(1)

IEEE Proof

IEEE TRANSACTIONS ON SIGNAL PROCESSING 1

Fractional Krawtchouk Transform With an Application to Image Watermarking

1

2

Xilin Liu, Guoniu Han, Jiasong Wu, Zhuhong Shao, Gouenou Coatrieux, and Huazhong Shu

3

Abstract—This paper proposes a novel fractional transform,

4

denoted as the fractional Krawtchouk transform (FrKT), a gen-

5

eralization of the Krawtchouk transform. The derivation of the

6

FrKT uses the eigenvalue decomposition method. We determine the

7

eigenvalues and the corresponding multiplicity of the Krawtchouk

8

transform matrix. Moreover, the orthonormal eigenvectors of the

9

transform matrix are derived. For validation purpose only and as

10

a first illustration of the interest of FrKT, a watermarking exam-

11

ple was chosen. Experimental results show that better watermark

12

robustness and imperceptibility are achieved by adjusting the frac-

13

tional orders in the FrKT.

14

Index Terms—Krawtchouk transform, fractional Krawtchouk

15

transform, weighted Krawtchouk polynomials, watermarking.

16

I. INTRODUCTION 17

T

HE continuous fractional Fourier transform (FrFT), a gen-

18

eralization of the Fourier transform, depends on an ad-

19

ditional parameter and can be interpreted as a rotation in the

20

time-frequency plane. The FrFT has been investigated and ap-

21

plied in quantum mechanics [1], [2] and signal processing fields

22

[3]–[5]. Such applications require the derivation of the discrete

23

fractional Fourier transform (DfrFT). Pei et al. [6], [7] proposed

24

a definition of the DfrFT based on the eigenvalue decompo-

25

sition of the transform matrix. Their method provides similar

26

transform as that of the continuous case. Moreover, the proposed

27

Manuscript received July 19, 2016; revised November 20, 2016 and December 26, 2016; accepted January 4, 2017. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Sergio Lima Netto.

This work was supported in part by the National Natural Science Foundation of China under Grants 61201344, 61271312, 61401085, 81101104, and 61073138, in part by the Ministry of Education of China under Grants 20110092110023 and 20120092120036, the Project-sponsored by SRF for ROCS, SEM, and in part by the Natural Science Foundation of Jiangsu Province under Grants BK 2012329, BK2012743, DZXX-031, and BY2014127-11, in part by the ‘333’ project under Grant BRA2015288, in part by the Qing Lan Project and Young Core Personal Project of Beijing Outstanding Talent Training Project 2016000020124G088.

X. Liu, J. Wu, and H. Shu are with the Laboratory of Image Science and Technology, School of Computer Science and Engineering, Southeast Univer- sity, Nanjing 210018, China, and also with the Centre de Recherche en Informa- tion Biom´edicale sino-franc¸ais, Nanjing 210096, China (e-mail: xilinliu168@

163.com; jswu@seu.edu.cn; shu.list@seu.edu.cn).

G. Han is with the Institute de Recherche en Math´ematiques et Applica- tion, Universit´e de Strasbourg et CNRS, Strasbourg 67084, France (e-mail:

guoniu.han@unistra.fr).

Z. Shao is with the College of Information Engineering, Capital Normal University, Beijing 100048, China (e-mail: shaozh2015@163.com).

G. Coatrieux is with the Latim, Inserm U 1101, Institut Mines- Telecom, Telecom Bretagne, Brest 29238, France (e-mail: gouenou.coatrieux@

Q1

telecom-bretagne.eu).

Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TSP.2017.2652383

DfrFT has important unitary and rotation properties. To achieve 28

better DfrFT results, the eigenvectors of the Fourier transform 29

matrix should better approximate the Hermite-Gaussian func- 30

tions which are the eigenfunctions of the FrFT [8]. Some other 31

definitions of DfrFT can be found in [9]–[11]. The DfrFT has 32

been applied in optical image encryption [12]. An overview 33

of the DfrFT in signal processing can be found in [13]. Some 34

other forms of fractional transforms have been developed, such 35

as the discrete fractional Hadamard transform, discrete frac- 36 tional Hilbert transform, discrete fractional cosine and sine 37

transforms [14]–[19]. 38

Yap et al. [20] introduced the Krawtchouk transform (also 39

known as Krawtchouk moments), another orthogonal trans- 40

form using the weighted Krawtchouk polynomials. Since the 41

weighted Krawtchouk polynomials are discrete, there is no nu- 42

merical approximation in deriving the transform coefficients. 43

By adjusting the parameters in the weighted two dimensional 44

(2-D) Krawtchouk polynomials, local image features can be 45

located and described. The Krawtchouk transform has been 46

successfully applied in image reconstruction and image wa- 47

termarking [21]–[23]. Yap et al. [21] used the Krawtchouk 48

transform for image reconstruction and it was shown that the 49

Krawtchouk transform outperforms other moments in terms of 50

reconstruction error. Venkataramana et al. [22] designed a wa- 51

termarking algorithm which is robust to geometric attack. Pa- 52

pakostas et al. In [23], a transform domain watermarking al- 53

gorithm based on Krawtchouk transform was proposed which 54

embeds the watermark in local regions of the image. Atakishiyev 55

et al. [24] derived a new transform known as fractional Fourier- 56

Krawtchouk transform, where the kernel function is the product 57

of an exponential function with parameterαand the Krawtchouk 58

function. 59

Our goal in this paper is to derive the fractional Krawtchouk 60

transform (FrKT) by using the eigenvalue decomposition 61

method of the transform matrix. Noticing that the eigenval- 62

ues of the transform matrix are 1 and –1, we determine the 63

multiplicity of each eigenvalue. Furthermore, the orthonormal 64

eigenvectors corresponding to the eigenvalues are derived us- 65 ing spectral decomposition and SVD. Finally, we provide the 66

definition of FrKT. The FrKT, which is a generalization of the 67

Krawtchouk transform, has two additional parameters, known as 68

the fractional orders. As an illustration of the FrKT applications, 69

a watermarking scheme for copyright protection is investigated. 70

Our intent is to assess the interest of FrKT and the benefits 71

that can be expected through a proper choice of the fractional 72

orders. 73

1053-587X © 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.

See http://www.ieee.org/publications standards/publications/rights/index.html for more information.

(2)

IEEE Proof

The rest of the paper is organized as follows. In Section II,

74

some preliminaries about Krawtchouk transform are provided.

75

The detailed procedure of deriving the FrKT and some prop-

76

erties of FrKT are elaborated in Section III. The image water-

77

marking scheme is reported in Section IV. Experiments to test

78

its robustness are carried out in Section V. Finally, Section VI

79

concludes the paper.

80

II. PRELIMINARIES 81

The 1-D Krawtchouk transform in terms of weighted

82

Krawtchouk polynomial is defined as [20]:

83

Qn =

N1 x= 0

Kn(x;p, N−1)f(x), n = 0, 1, . . . , N 1 (1) where f(x) is an 1-D signal of length N, and Kn(x;p,

84

N−1) is the n-th order weighted Krawtchouk polynomial,

85

defined as

86

Kn(x;p, N−1) =κn(x;p, N−1)

w(x;p, N−1) ρ(n;p, N−1) (2) with

87

w(x;p, N−1) =

N−1 x

px(1−p)N1x, (3) ρ(n;p, N−1) =

p−1 p

n n!

(−N+ 1)n. (4) Andκn(x;p, N 1)is the classical Krawtchouk polynomial

88

κn(x;p, N−1) =2F1

−n,−x;−N+ 1;1 p

, p∈(0, 1) (5) where2F1is the hypergeometric function, defined as

89

2F1(a, b;c;z) = k= 0

(a)k(b)k (c)k

zk

k! (6)

and(a)k is the Pochhammer symbol given by

90

(a)k =a(a+ 1). . .(a+k−1) = Γ (a+k)

Γ (a) . (7) The weighted Krawtchouk polynomialKn(x;p, N−1)sat-

91

isfies the following orthogonal property

92

N−1 x= 0

Kn(x;p, N−1)Km(x;p, N 1) =δn m. (8) This leads to the following inverse transform

93

f(x) =

N1 n= 0

QnKn(x;p, N−1). (9)

For anN×N imageg(x, y), the forward and inverse two 94

dimensional transformations are respectively given by 95

Qn m =

N1 x= 0

N1 y= 0

Kn(x;p, N−1)Km(y;q, N−1)g(x, y) (10) g(x, y) =

N−1

n=0 N−1

m=0

Qn mKn(x;p, N−1)Km(y;q, N−1). (11)

III. CONSTRUCTION OF THEFRACTIONALKRAWTCHOUK 96

TRANSFORM 97

In this section, we propose a novel discrete fractional 98

transform known as fractional Krawtchouk transform (FrKT). 99

Similarly to the development of DfrFT, the eigenvalue decom- 100

position of Krawtchouk transform matrix will be used to define 101

the discrete FrKT. The eigenvalues and eigenvectors of FrKT 102

are derived and some properties of FrKT are also investigated. 103

A. Eigenvalues and Eigenvectors of the Krawtchouk 104

Transform Matrix 105

The 1-D Krawtchouk transform for signalf(x)of lengthN 106

defined in (1) can be written in the following matrix form 107

Q=Kf (12)

where the transform matrixKis defined by 108

Kn ,x =Kn(x;p, N−1), 0≤n, x≤N−1. (13) The Krawtchouk transform matrix K has the following 109

properties: 110

Property 1: Kis symmetric. 111

This is straightforward from the definition of Krawtchouk 112

polynomial (2) and (13). 113

Property 2: K is orthogonal, that is KTK=KKT =I, 114

withIthe identity matrix [20]. 115

Property 3: The eigenvalues ofKare 1 and –1. 116

Proof: Letλbe an eigenvalue of K anduRN×1 be its 117

corresponding eigenvector, that is 118

Ku=λu. (14) Then, with properties 1 and 2, we have 119

u=KKu=λKu=λ2u. (15)

Thus 120

λ21

u= 0 (16) and the two eigenvalues ofKareλ0 = 1,λ1 =1. 121

With these properties ofK, we have the following theorem 122

to determine the multiplicities of its eigenvalues. 123

Theorem 1: For the Krawtchouk transform matrixKof size 124

N×N, if N is even, then the multiplicities of eigenvalues 125

λ0 =1 andλ1 =−1 are equal. IfN is odd, the multiplicity of 126

eigenvalueλ0=1 is equal to one more than that of eigenvalue 127

λ1 =−1. 128

Proof: See Appendix. 129

(3)

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 3

Theorem 1 specifies the eigenvalue multiplicity ofK. Next,

130

we construct a set of orthonormal eigenvectors of matrix K

131

corresponding to the two eigenvalues.

132

From properties 1 and 2, we know thatKis a symmetric and

133

orthogonal real matrix. According to the spectral theorem [25],

134

we know thatKhas the following spectral decomposition

135

K=λ0P0+λ1P1 (17) wherePi, i = 0,1, is the orthogonal projection matrix on the

136

ith eigenspace ofK, andλiis the ith eigenvalue ofK. Then, the

137

expression of projection matrices can be derived as follows.

138

Since for any integerm, there is Kmx = λmx, hence the

139

matrixKm has the same eigenvectors and consequently pro-

140

jection matrices as matrixK. Note thatK0 = I, therefore, we

141

have

142

Km =λm0 P0+λm1 P1, m= 0,1,2, ... (18) To obtain the two matricesP0 andP1, we write the above

143

equation form = 0, 1 in matrix form as

144

A P0

P1 = I

K (19)

with

145

A=

I I

λ0I λ1I . (20) Notice that

146

AAT =

2I (λ0+λ1)I (λ0+λ1)I (λ20+λ21)I = 2

I 0

0 I . (21) From (21), we deduce that the inversion ofAis

147

A−1= 0.5AT. (22) MultiplyingA1 in (22) on both left sides of (19), we have

148

P0

P1 = 0.5AT I

K = 0.5

I λ0I I λ1I

I

K . (23) Thus

149

P0 = 0.5 (I+K) (24) P1 = 0.5 (IK). (25) From (24) and (25), we can get some properties of P0

150

andP1.

151

Property 4: PTi =Pi, i=0, 1.

152

Property 5: [26]:P20 =P0,P21 =P1.

153

Property 6: P0 andP1 are orthogonal, that isP0P1 =0,

154

where0denotes the zero matrix.

155

Lemma 1: Both matrices P0 and P1 have eigenvalues

156

0 and 1. Moreover, the multiplicity of eigenvalue 1 forP0 is

157

equal to the multiplicity of eigenvalue 1 ofK; the multiplicity

158

of eigenvalue 1 forP1is equal to the multiplicity of eigenvalue

159

–1 ofK.

160

Proof: The proof of the first part of this lemma can be found

161

in [27]. Let γ, ηandλbe respectively the eigenvalues of the

162

matricesP0,P1 andK, using (24) and (25), we have 163

|γI−P0| =|γI−0.5(K+I)|

=|(γ−0.5)I0.5K|

= 0.5N |(2γ−1)IK|

= 0. (26)

Similarly, we can obtain 164

|ηI−P1|= 0.5N |(2η−1)I+K|= 0 (27)

and 165

IK|= 0. (28)

From (26)–(28), we have 166

1 =λ (29)

(2η1) =λ. (30) Hence, ifλ=1, there isγ=1, η=0, and ifλ=−1, then 167

γ=0, η=1. 168

The proof of Lemma 1 has now been completed. 169 Lemma 2: The eigenvectors corresponding to nonzero 170

eigenvalues of P0 are orthogonal to those corresponding to 171

nonzero eigenvalues ofP1. 172

Proof: Let the size of P0 be N×N, and uiandvj be 173

eigenvectors corresponding to nonzero eigenvalues ofP0 and 174

P1, respectively (from Lemma 1 and Theorem 1, we know 175

that if N is even, i.e., N = 2m, then i, j=1, 2, ..., m, and 176

if N is odd, i.e.,N = 2m+1 then i=1, 2, ..., m+1, j= 177

1, 2, ..., m), then we have 178

P0ui=ui (31)

and 179

P1vj = vj. (32)

With (31) and (32), we can write 180

(ui)Tvj = (P0ui)T (P1vj) = (ui)TPT0P1vj. (33) SincePT0P1 =0from property 6, it follows from (33) that 181

(ui)Tvj =0. (34) The proof of Lemma 2 is thus obtained. 182

Lemma 3: The eigenvectors corresponding to nonzero 183

eigenvalues of P0 andP1 are the eigenvectors of K, corre- 184

sponding to eigenvaluesλ0 =1,λ1 =−1 ofK, respectively. 185

Proof: Letui andvj be the eigenvectors corresponding to 186

nonzero eigenvalues ofP0andP1, respectively. Then, we have 187

Kui = (λ0P0+λ1P1)ui =λ0P0ui+λ1P1ui

=λ0P0ui+λ1P1P0ui=λ0P0ui+λ1PT1P0ui

=λ0P0ui=λ0ui. (35) Kvj =λ0P0vj+λ1P1vj =λ0P0P1vj +λ1P1vj

=λ1vj. (36)

The proof of Lemma 3 has now been completed. 188

(4)

IEEE Proof

We are now ready to derive a set of orthonormal eigenvec-

189

tors ofKby using the approach reported in [8]. The detailed

190

procedure is described as follows.

191

By performing the SVD decomposition of P0 andP1, we

192

have

193

P0=U0S0V0T (37) P1=U1S1V1T. (38) Since the singular values ofP0andP1are square root of non-

194

negative eigenvalues ofP0PT0 andP1PT1,respectively, using

195

properties 1 and 2, and Lemma 1, we have

196

P0 =PT0P0=

U0S0VT0T

U0S0VT0

=V0S0UT0U0S0V0T =V0S20VT0 =V0S0VT0. (39) Similarly, for P1, we have

197

P1=V1S1VT1. (40) It can be observed from (39) and (40) that

198

P0V0=V0S0, P1V1=V1S1. (41) The above equation shows that V0 andV1 are a set of or-

199

thonormal eigenvectors ofP0andP1, respectively.

200

According to Lemma 1 and Theorem 1, ifN is even (N =

201

2m), the multiplicity of the eigenvalue 1 forP0andP1is both

202

m. IfN is odd (N = 2m+1), the multiplicity of eigenvalue

203

1 forP0 ism+1, and the multiplicity of eigenvalue 1 forP1

204

ism. With this property and Lemma 3, we can takeui andvj

205

be the ith and jth column ofV0,V1respectively. Then, we can

206

claim that if N is even, i.e., N = 2m, a set of orthonormal

207

eigenvectorsVofKcan be obtained by

208

V= [u1,u2,...,um,v1,v2,...,vm], (42) and if N is odd, i.e., N=2m+1, a set of orthonormal eigen-

209

vectorsVofKcan be written as

210

V= [u1,u2,...,um,um+ 1,v1,v2,...,vm]. (43) B. The Construction of One Dimensional Fractional

211

Krawtchouk Transform

212

From the previous subsection, a set of orthonormal eigen-

213

vectors ofK can be constructed. Then, we can rearrange the

214

columns ofVto match the eigenvectors to the eigenvalues of

215

Ksuch that

216

K=VDVT (44) whereDis a diagonal matrix with diagonal entries the eigen-

217

values ofK, andVis a set of orthonormal eigenvectors,

218

V=

[u1,v1,u2,v2,...,um,vm],ifN is even

[u1,v1,u2,v2,...,um,vm,um+ 1],ifN is odd (45)

The eigenvalues inDare arranged in the following form if 219

the size ofKis even: 220

D=

⎢⎢

⎢⎢

⎢⎢

⎣ 1

−1 1

. ..

−1

⎥⎥

⎥⎥

⎥⎥

(46)

and if the size of K is odd as: 221

D=

⎢⎢

⎢⎢

⎢⎢

⎣ 1

−1 1

. ..

1

⎥⎥

⎥⎥

⎥⎥

. (47)

Since the diagonal elements of Dcan be written as ej k π 222

withk = 0, 1, . . . , N1, as the generalization of DfrFT [6], 223

[7], we take the fractional order as the power of eigenvalues 224

inD. Finally, the FrKT transform matrixKa of sizeN with 225

order a corresponding to an angle α where α = πa can be 226

defined as 227

Ka=VDaVT =

N−1 k= 0

ej k αvkvTk (48) wherevk(k=0, 1, ..., N1)is the kth column ofV, andDa 228

is defined as 229

Da=

⎢⎢

⎢⎢

⎢⎢

⎢⎣ ej

e−j α

ej . ..

e−j(N−1)α

⎥⎥

⎥⎥

⎥⎥

⎥⎦

. (49)

Thus, the 1D forward FrKT of signalf(x)of lengthN with 230

order a can be expressed by 231

Qa =Kaf. (50) The corresponding inverse FrKT can be written as 232

f =K−aQa. (51)

C. Generalization of the Fractional Krawtchouk Transform to 233

2-D 234

The 1-D FrKT presented in the previous section can be easily 235

generalized to 2-D situations. The definition of 2-D FrKT with 236

fractional order (a, b) corresponding to angle (α, β) where 237

α = πa, β = πbof an imageg(x, y)can be achieved by firstly 238

performing the FrKT on each column of the image, and then on 239

each row of the transformation. It can be expressed as 240

Qa,b =KagKb. (52) Notice that the two matricesKaandKb generated from the 241

Krawtchouk matrix defined in (13) may have different param- 242

eters for the weighted Krawtchouk polynomials. In our paper, 243

(5)

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 5

we define the weighted Krawtchouk polynomial parameters as

244

pforKaand asqforKb withp, q∈(0, 1).

245

The corresponding inverse FrKT can be generated as

246

g=KaQa,bKb. (53) From (53), it can be observed that there are two more extra

247

parameters(a, b) in the transformation when compared with

248

the traditional 2-D Krawtchouk transform. They come in addi-

249

tion to the two parameters(p, q)in the weighted Krawtchouk

250

polynomials.

251

D. Property of Fractional Krawtchouk Transform Matrix

252

For the discrete fractional Fourier transform, the basic re-

253

quirements of the transform matrix to define the DfrFT are:

254

(1) unitary, (2) index additive, and (3) approximating the con-

255

tinuous Fourier transform [8], [9]. In this section, we will inves-

256

tigate some properties of FrKT transform matrixKadefined in

257

(48). As to the properties of DfrFT transform matrix, we will

258

present some properties ofKa, such as unitary, index additivity,

259

and reduction to the Krawtchouk transform when the order is

260

equal to 1.

261

It is obvious from (49) that ifa = 0,Dareduces to the iden-

262

tity matrix and the FrKT to the identity operator. Moreover,

263

ifa = 1,Da=Dand then the FrKT is reduced to the tradi-

264

tional Krawtchouk transform. We focus on the unitary and index

265

additivity properties of FrKT transform matrix in the following.

266

Property 7: Additivity

267

KaKb =Ka+b. (54) Proof: From (48) we have

268

KaKb =VDaVT

VDbVT

=VDaDbVT. (55) Since it follows from (49) that

269

DaDb =Da+b. (56) Therefore, by substituting (56) into (55), we have

270

KaKb =VDa+bVT =Ka+b. (57) The additivity property is thus shown.

271

Property 8: Unitarity

272

K−a= (Ka)−1. (58) The proof of property 8 can be achieved by makingb = −a

273

in (54) and noticing the fact thatK0 = I.

274

IV. APPLICATION TOIMAGEWATERMARKING 275

The DfrFT has been applied in many fields such as image

276

fusion [28], image copy-move forgery detection [29] and image

277

encryption [30]. The proposed FrKT can also be applied to these

278

fields. Due to the limited paper length, our objective is only to

279

provide a watermarking illustration. A brief introduction is pro-

280

vided and we refer the interested readers to recent reviews [31],

281

[32]. Schematically, digital image watermarking is a technique

282

mainly devoted to the protection of intellectual property rights

283

by embedding a digital watermark (or a message) into the im-

284

ages. The watermark is robustly and imperceptibly embedded

285

into the host image so as to allow for example verifying the 286 origin and the destination of the data [33]. Image watermarking 287

techniques can be classified into two categories: the spatial do- 288

main methods and the transform domain methods [34]. Because 289

space-based approaches are relatively weak in case of image at- 290

tacks (i.e. image filtering, compression, etc.), transform domain 291

methods have been more extensively investigated. They include 292

for instance the discrete Fourier transform (DFT) [35], discrete 293

cosine transform (DCT) [36], [37], discrete wavelet transform 294

[38], [39], fractional Fourier transform [40], quaternion Fourier 295

transform [41], SVD transform [42], [43], and moment trans- 296

form [44]. 297

In [45], the Krawtchouk transform coefficients have been 298

used as host coefficients to embed the watermark owing to their 299

robust behavior. As a generalization of the Krawtchouk trans- 300 form, FrKT has two additional fractional orders. By adjusting 301

the fractional orders in the transform, different transform domain 302

coefficients can be obtained. So we use the FrKT coefficients to 303

embed the watermark and the fractional orders can then serve 304

as extra secret keys to enhance the security of the watermark- 305

ing scheme (refer to [46] for more details). In the following, 306

the block based watermarking approach described in [45] has 307

been applied in the FrKT domain. It has the following features 308

[47]: (i) partitioning the host image into small blocks fulfills 309

the un-detectability and imperceptibility requirements; (ii) the 310

ability to handle each block separately allows using multiple 311

secrete keys for secret block selection, improving consequently 312

the watermarking security; (iii) the watermark capacity (i.e. the 313

size of the embedded message expressed in bits of message per 314

image pixel) will vary from one block to another according to 315 their properties while establishing a compromise between the 316

watermark robustness and imperceptibility. The watermark em- 317

bedding and extraction procedures are shown in Figs. 1 and 2, 318

respectively. 319

A. Watermark Embedding Procedure 320

Let us consider an original grayscale image g of N×N 321

pixels, and anl×lwatermarkW(see Fig. 3). It is embedded 322

according to the following steps: 323

Step 1: To enhance the security of the scheme and eliminate 324

the pixel correlation in spatial domain, the watermark is scram- 325

bled fromWintoW1at first with the Arnold transform, which 326

is defined as follows [48]: 327

x∗ y∗

=

c d e f

x y

+ s

t mod (l) (59) where (x, y),(x∗, y∗)are the coordinates of the original and 328

scrambled watermark pixels, respectively. The scrambling pa- 329

rametersc, d, eandf are such that 330

c d e f

= 1. (60) We choosec = 1, d = 1, e = 1, f = 2, s = 0 andt = 331

0 in the following. 332

Step 2: Divide the original image g into 8×8 non- 333

overlapping blocks. Thus, there will beN/8 × N/8blocks 334

(6)

IEEE Proof

Fig. 1. The diagram for watermark embedding.

Fig. 2. The diagram for watermark extraction.

Fig. 3. Some original images - (a) to (j) - and watermarks - (k) and (l) - from our test database.

for the original image, wherexdenotes the lower integer part

335

ofx. To ensure the security of the watermark, we secretly select

336

l2(l≤N/8) blocks. The secret keyKEY1corresponds to the

337

position of the selected blocks. It will be necessary to know it

338

to extract the watermark.

339

Step 3: Perform FrKT on each block. The transform matrix

340

of one block is denoted by C. Note that the two parameters

341

p, q, and the fractional orders a and b are extra key values that

342

have also to be known at the extraction stage. These values are

343

denoted asKEY2.This contributes to reinforce the security of

344

the watermarking scheme. For each block, the element (k1, k2)

345

in the real partC0ofCis used to embed one bit of the watermark

346

using the Dither modulation method [49], [50]:

347

|C0(k1, k2)|

=

⎧⎪

⎪⎩

×round

|C0(k1,k2)|

+Δ2, if W1(i, j) = 1 2Δ×round

|C0(k1,k2)|

Δ2, if W1(i, j) = 0 (61)

where Δ is the quantization step controlling the embedding

348

strength of the watermark bit, | · | is the absolute operator,

349

round(·) denotes the rounding operation to the nearest inte-

350

ger, W1(i, j)is the scrambled watermark bit at the position

351

(i, j)andC0 is the modified block.

352

Step 4: The inverse FrKT is applied on each modified block 353

C0to obtain the watermarked image. 354

B. Watermark Extraction Procedure 355

To extract the watermark from a received imageg, one has 356

to know the secret keys(KEY1,KEY2)and then to apply the 357 watermark extraction procedure as follows: 358

Step 1: Divide the test imageginto 8×8 non-overlapping 359

blocks, and compute the FrKT coefficients of each block. 360

Step 2: For one block FrKT coefficients C, the element 361

(k1, k2)in the real partC0 is used to extract one bit of water- 362

mark at position(i, j)using the minimum distance decoder in 363

the following way: 364

W1(i, j) = argσ∈{0,1}min(|C0(k1, k2)|σ− |C0(k1, k2)|) (62) whereW1is the extracted scrambled watermark, and 365

|C0(k1, k2)|σ=

⎧⎪

⎪⎩

×round

|C0(k1,k2)|

+Δ2, if σ= 1 2Δ×round

|C0(k1,k2)|

Δ2 ,if σ= 0 (63) Step 3: Perform the inverse Arnold transform onW1to obtain 366

the extracted watermark informationW. 367

(7)

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 7

Finally, the extracted watermarkWcan be used to identify

368

the ownership and copyright.

369

V. EXPERIMENTALRESULTS 370

Experiments have been carried out to assess the validity of

371

the watermarking scheme using FrKT for image copyright pro-

372

tection. To conduct these experiments, we consider 96 gray

373

images of size 512×512 from the image database of the Com-

374

puter Vision Group, University of Granada [51]. It can be seen

375

from the embedding procedure that the maximum watermark

376

capacity, which can be embedded into the host image with size

377

N×N, is N2. We used two binary images of size 64×64

378

from the MPEG-7 database [52]: “Deer” and “Cup” as water-

379

marks in the experiments. That is, 4096 bits were embedded

380

into each host image. Some of the test images and watermarks

381

are shown in Fig. 3. One bit of watermark is embedded into

382

each block of the original image. The first row and first col-

383

umn position in the transformed block is selected to embed

384

the watermark due to the fact the low order Krawtchouk trans-

385

form coefficients have been shown more robust to attacks [45].

386

This FrKT based watermarking scheme is compared with the

387

Krawtchouk transform approach reported in [45], as well as

388

the watermarking using DCT [37], DWT [38], LWT [39], SVD

389

[42], and Tchebichef moment (TM) [44], the discrete fractional

390

cosine transform (DfrCT), the discrete fractional sine transform

391

(DfrST), and DfrFT. In the following experiments, the parame-

392

ters in the Krawtchouk polynomial arep = q = 0.5. The wa-

393

termark imperceptibility is evaluated quantitatively through the

394

Peak Signal-to-Noise Ratio (PSNR) defined as [53]

395

PSNR= 10log102552

MSE (64)

where MSE is the mean square error between the original image

396

g(x, y)and the watermarked imagegw(x, y), given by

397

MSE=

N−1 x= 0

N−1 y= 0

(g(x, y)−gw(x, y))2. (65) The performance in terms of watermark robustness is mea-

398

sured through the bit error rate (BER) expressed by [43]

399

BER= l

i= 1

l

j= 1|W(i, j)−W(i, j)|

l×l (66)

where W is the extracted watermark and W is the original

400

binary watermark of sizel×l.

401

In a first experiment, the watermark imperceptibility was

402

tested and we determined the proper quantization step for wa-

403

termark embedding (see Dither modulation in Section IV-A).

404

Using the 96 original images and the 2 watermarks, 192 host

405

image and watermark pairs are generated. For each pair, the

406

watermark is embedded with the fractional ordera = b = 0.4

407

and the quantization step is increasing from 1 to 45 with an in-

408

crement equal to 1. Then, the PSNR of the watermarked image

409

is calculated. Fig. 4 shows the average PSNR value of the water-

410

marked images of the 192 pairs for these different quantization

411

steps. We also made a comparison with the Krawtchouk trans-

412

form based watermarking scheme. It can be seen from Fig. 4 that

413

Fig. 4. Average PSNR value obtained over our image test database depending on the watermark embedding strength (i.e. the quantization step of the dither modulation).

the PSNR value of the watermarked image decreases with the 414

increase of the quantization step. Moreover, the PSNR value of 415

the watermarked image is higher when using the FrKT transform 416

instead of the Krawtchouk transform for the same quantization 417

step. Generally, a larger quantization step is required for better 418

robustness, meanwhile the quality of watermarked image de- 419

creases. To get watermark imperceptibility, the PSNR value is 420

expected to be higher than 40 dB. Therefore, the quantization 421

step of the Krawtchouk transform based scheme could be se- 422

lected to 25, leading to an average PSNR value of 40.72 dB. 423

For the FrKT, with quantization steps 25 and 40 respectively, 424

the PSNR averages of the watermarked images are equal to 425

46.43 dB and 42.25 dB. 426

A second experiment was conducted to evaluate the robust- 427 ness of these two approaches with fractional ordera =b = 0.4, 428

and the quantization step defined in the previous experiment us- 429

ing all original images and the two watermarks shown in Fig. 3. 430

The watermark attacks included the most common signal pro- 431

cessing and geometric attacks (see Table I). Each watermarked 432

image used in the previous experiment was distorted consid- 433

ering various attacks. Table II shows some examples of the 434

extracted watermarks and their corresponding BER values. The 435

change of BER for the geometric attack is due to the inter- 436

polation error and the truncation error that occur when cor- 437

recting the geometric attack (i.e. inversely transforming the 438

geometric transformation to neutralize the attacks [41]). The 439

mean BER values of the proposed FrKT and Krawthouk trans- 440

form based approaches are displayed in Fig. 5. The comparison 441

of the FrKT based watermarking method with DCT, DWT, LWT, 442 SVD, TM, DfrST, DfrCT, and DfrFT based algorithms is shown 443

in Fig. 6. To make a fair comparison, the quantization steps in 444

these methods were adjusted such that the PSNR of the water- 445

marked image is about 40 dB. To consider the situation when 446

the fractional orders are different, we also make a comparison 447

with the proposed watermarking scheme with fractional orders 448

(a, b) = (0.4,0.5)in Fig. 5. It can be observed from Figs. 5 449

and 6 that: (1) The BER values increase with the enhance- 450

ment of the attack power of the filter, noise, JPEG compres- 451

sion, and sharpening attacks. (2) By increasing the quantization 452

strengthΔfrom 25 to 40, the proposed schemes are much more 453

(8)

IEEE Proof

TABLE I

IMAGEATTACKS AND THEIRPARAMETERIZATION

TABLE II

SOMEEXAMPLES OFEXTRACTEDWATERMARKS AND THEIRBER VALUESUNDERDIFFERENTATTACKS

robust to different attacks. (3) The FrKT based schemes with

454

(a, b) = (0.4,0.4) and(a, b) = (0.4,0.5)have lower BER

455

values for most attacks than the Krawtchouk one, that is, the

456

watermarking scheme using FrKT provides a better robustness

457

by a sound selection of the fractional orders. Some better choice

458

of these parameters will be presented in the last experiment of

459

this section. (4) The proposed scheme can achieve better wa-

460

termark robustness in most attack situations than the classical

461

algorithms, such as the DCT, DWT, LWT, SVD, DfrST, DfrCT,

462

and DfrFT based algorithms. All the methods are not robust to

463

the shifting attack because they used a block based principle,

464

and a change of the block position in the extraction procedure

465

leads to the failure of the watermark extraction. Moreover, the 466

proposed approach and most of the compared methods are not 467

robust to the histogram equalization attacks because they mod- 468

ify the pixel values in each block. In contrast, the methods of 469

[37] and [39] are robust to the histogram equalization. We think 470

this is due to their embedding strategies. The difference between 471

two coefficients of adjacent blocks is used to embed the water- 472

mark bit in [37] and the watermark is embedded into the edge 473

part of the image in [39]. 474

The third conducted experiment shows that the watermark 475

security is enhanced by the fractional orders in the FrKT. The 476

objective here is to prevent the attackers from generating the 477

(9)

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 9

Fig. 5. Mean BER values of the FrKT and Krawtchouk transform based watermarking schemes under different attacks.

counterfeit key to extract the watermark. The Deer watermark

478

was thus embedded into the original images of Fig. 3(a) with

479

fractional ordersa = b = 0.4. In the extraction procedure, we

480

separately extract the watermark without attacks with fractional

481

ordersa = bincreasing from 0.2 to 2.0 by 0.2. The extracted

482

watermark BER values with various fractional orders are shown

483

in Fig. 7. As it can be seen, the BER of the extracted watermark

484

with wrong fractional orders is about 0.5. This indicates that the

485

watermark information is not properly extracted or equivalently

486

that, without the good parameter values, it is not possible to

487

access the embedded watermark. The watermark examples dis-

488

played in Fig. 7 confirm that any watermark information cannot

489

be recovered when using the wrong fractional orders.

490

In the last experiment, we analyze the influence of fractional

491

orders variation whena = bin the embedding and extraction

492

stage changes from 0.1 to 1 on the watermark imperceptibility 493

and robustness. The Deer watermark is separately embedded 494

into the 96 images using a quantization step equal to 25 and 495

40 respectively. Then, the PSNR of each watermarked image 496

is computed. Fig. 8 shows the average PSNR of the 96 images 497

while varying the fractional orders a=b from 0.1 to 1 by 0.1. 498

It can be seen that the smallest PSNR value corresponds to 499

the fractional ordersa = b = 1 when the FrKT reduces to the 500

Krawtchouk transform. Besides, the highest PSNR values (about 501

46 dB, much higher than the required 40 dB mentioned above 502

for imperceptibility) are obtained when a = b = 0.4 or 0.6. 503

To show the influence of the fractional orders on the robustness, 504

and to guide the choice of the fractional orders, the watermarked 505

images have been submitted to different attacks to which our 506

proposed method can better resist, such as filter, noise, JPEG, 507

(10)

IEEE Proof

Fig. 6. Mean BER values comparison of the proposed FrKT based watermarking method and some available watermarking algorithms.

Fig. 7. Extracted watermark and corresponding BER value with fractional orders different from the embedding stage in the extraction procedure (with a = b = 0.4 in the embedding procedure).

rotation, scaling, and sharpening shown in the second ex-

508

periment. Fig. 9 depicts the BER variations of the extracted

509

watermarks when using different fractional orders. One can

510

see for instance that FrKT achieves either better robustness

511

Fig. 8. Average PSNR values of watermarked image with Deer watermark under various fractional orders in FrKT (with quantization stepΔ = 25,40).

(filtering, noise and JPEG compression attacks) than the spe- 512

cial case Krawtchouk transform (a = b = 1) or similar perfor- 513

mance (scaling and rotation attacks). However, the BER values 514

corresponding to the fractional ordersa = b = 0.1 and 0.7 are 515

relatively high. This is because the absolute value of the modi- 516

fied FrKT coefficients under these orders are very small and can 517

(11)

IEEE Proof

LIU et al.: FRACTIONAL KRAWTCHOUK TRANSFORM WITH AN APPLICATION TO IMAGE WATERMARKING 11

Fig. 9. Average BER of extracted Deer watermark with various fractional orders used in FrKT of the embedding and extraction process under different attacks.

(a) Median filter 5×5, (b) Average filter 5×5, (c) Salt & Pepper noise with density 0.02, (d) Gaussian noise with variance 0.02, (e) JPEG compression with quality factor 30, (f) Rotation with angle 25o, (g) Scaling with factor 0.9, (h) Gaussian blur with standard derivation 1, (i) Sharpening with radius 2.

be easily changed by an attack. In fact, most of the FrKT coeffi-

518

cients are in the interval(−Δ,Δ), which leads to the modified

519

value−Δ/2 if the watermark bit is 0 whileΔ/2 if the watermark

520

bit is 1. Subsequently, the watermark bit cannot be accurately

521

extracted from these modified coefficients in the watermark ex-

522

traction procedure. Moreover, it can be seen from Fig. 9 that the

523

BER of the extracted watermark from the watermarking using

524

quantization step 40 always achieves better results than that us-

525

ing quantization step 25. Notice that the BER for quantization

526

step 40 fora = b = 0.1 and 0.7 is relatively higher than for

527

quantization step 25. This is due to the fact that the watermark

528

bit 0 cannot be accurately extracted even if no attack is per-

529

formed on the watermarked image because of the small modified

530

coefficients. It can be observed from Fig. 9 that a better water-

531

mark robustness can be achieved by an appropriate choice of

532

the fractional orders, such asa = b = 0.3, 0.4,0.6,0.8,0.9.

533

However, we have pointed out in Fig. 5 that a better performance

534

can also be achieved ifa = b, such asa = 0.4, b = 0.5. Nev-

535

ertheless, up to now, it is not easy to give a standard method for

536

choosing the fractional orders. We plan to study the optimization

537

of fractional orders selection by means of adaptive watermark-

538

ing [43], [54]. Such technique can be further combined with the

539

approach reported in [55] on Human Visual System (HVS) in

540

order to adaptively determine the quantization step and to im- 541

prove the performance of the proposed watermarking scheme. 542

Beyond that, feature point detection can be applied to design a 543

local image watermarking system capable to face the watermark 544

shifting attack situation [56]. 545

VI. CONCLUSION 546

This paper makes the following main contributions: firstly, it 547

determined the eigenvalues and the corresponding multiplicity 548

of each eigenvalue of the FrKT transform matrix. Secondly, it 549

presented a method for deriving a set of orthonormal eigen- 550 vectors corresponding to each eigenvalue of the Krawtchouk 551

transform matrix. Lastly, the definition of FrKT from the eigen- 552

value decomposition of the transform matrix was given and 553

some important properties of FrKT were demonstrated, such as 554

the unitary, the index addition, and the approximation of the 555

Krawtchouk matrix with particular fractional orders. 556

For a first assessment of this theoretical study, we used a 557

watermarking application and we compared its performance 558

with the classical Krawtchouk transform and other transforms. 559

It has been shown that more watermark imperceptibility and 560

robustness under most attacks for the same capacity can be 561

Références

Outline

Documents relatifs

The existing solutions often build a virtual network provider level model and map peering links with simple algorithm (e.g. shortest path algorithm) before mapping sub VN in

Weighted Hölder continuity of Riemann-Liouville fractional integrals - Application to regularity of solutions to fractional Cauchy problems with Carathéodory dynamics... Weighted

As in previous section (dedicated to discrete domain models), the aim addressed in reference [1] was the deriva- tion of a continuous domain fractional eld framework associated

Equipped with these bounds we study a hyperbolic-parabolic model of chemotaxis and prove the global existence of solutions in cer- tain dissipation regimes.. In particular, in

Rhumatologie Neuro-chirurgie Anesthésie Réanimation Anatomie Biochimie-chimie Dermatologie Chirurgie Générale Traumatologie orthopédique Hématologie biologique Chirurgie

In this paper, we are interested in the stabilization problem of MISO fractional systems with different I/O delays which are not necessarily commensurate. This MISO structure

The theorem 2 also gives us that the inverse found for the fractional Laplacian of order α defined on an interval is not the Riesz operator of order −α on the same interval, there is

The fractional embedding procedure allows us to define a natural fractional analogue of the Euler-Lagrange equation. This result is satisfying because the procedure is fixed. How-