• Aucun résultat trouvé

Optimal transform domain watermark embedding via linear programming

N/A
N/A
Protected

Academic year: 2022

Partager "Optimal transform domain watermark embedding via linear programming"

Copied!
17
0
0

Texte intégral

(1)

Article

Reference

Optimal transform domain watermark embedding via linear programming

PEREIRA, Shelby, VOLOSHYNOVSKYY, Svyatoslav, PUN, Thierry

Abstract

Invisible Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. In recent years it has been recognized that embedding information in a transform domain leads to mo re robust watermarks. A major difficulty inwatermarking in a transform domain lies in the fact that constraints on the allowable distortion at any pixel may be speci ed in the spatial domain. The central contribution of the paper is the proposal of an approach which takes into account spatial domain constraints in an optimal fashion. The main idea is to structure the watermark embedding as a linear programming problem in which we wish to maximize the strength of the watermark subject to a set of lin- ear constraints on the pixel distortions as determined by a masking function. We consider the special cases of embedding in the DCT domain and wavelet domain using the Haar wavelet and Daubechies 4-tap lter in conjunction with a masking function based on a non-stationary Gaussian model, but the algorithm is applicable to any combination of transform and masking functions. Our results indicate that [...]

PEREIRA, Shelby, VOLOSHYNOVSKYY, Svyatoslav, PUN, Thierry. Optimal transform domain watermark embedding via linear programming. Signal Processing , 2001, vol. 81, no. 6, p.

1251–1260

DOI : 10.1016/S0165-1684(01)00042-1

Available at:

http://archive-ouverte.unige.ch/unige:47479

Disclaimer: layout of this document may differ from the published version.

(2)

Embedding Via Linear Programming

S. Pereira, S. Voloshynoskiy, and T. Pun

University of Geneva - CUI, 24rue General Dufour, CH1211,Geneva 4,

Switzerland

http://cuiwww.unige.ch/vision/

E-mail:fShelby.Pereira,svolos,Thierry.Pung@cui.unige.ch

Abstract

InvisibleDigitalwatermarkshavebeenproposedasamethodfordiscouragingillicit

copying and distribution of copyright material. In recent years it has been recog-

nized that embedding information in a transform domain leads to mo re robust

watermarks. A major diÆcultyin watermarking in a transform domain liesin the

factthatconstraintsontheallowabledistortionatanypixelmaybespeciedinthe

spatialdomain.Thecentralcontributionofthepaperistheproposalofanapproach

whichtakesintoaccountspatialdomainconstraintsinanoptimalfashion.Themain

ideais to structurethewatermarkembeddingasa linearprogrammingproblem in

which we wish to maximize the strength of the watermark subject to a set of lin-

ear constraints on the pixel distortions as determined by a masking function. We

consider the special cases of embedding in the DCT domain and wavelet domain

usingthe Haar wavelet and Daubechies4-tap lter inconjunction with a masking

functionbasedonanon-stationaryGaussianmodel,butthealgorithmisapplicable

to any combination of transformand masking functions. Our resultsindicate that

theproposedapproach performs wellagainst lossy compressionsuch asJPEGand

other typesof lteringwhichdo notchangethegeometry of theimage.

Key words: watermark, linear programming,copyright,DCT,wavelet

1 Introduction

The idea of using a robust digital watermark to detect and trace copyright

violations has stimulated signicant interest among artists and publishers in

recent years. Podilchuk[1]givesthreeimportantrequirementsfor aneective

watermarking scheme: transparency, robustness and capacity. Transparency

refers to the fact that we would like the watermark to be invisible. The wa-

termarkshould alsoberobustagainstavariety ofpossibleattacks by pirates.

(3)

pect ratio changes, rotation, cropping, row and column removal, addition of

noise, ltering, cryptographic and statistical attacks, as well as insertion of

other watermarks [2]. The other requirement is that the watermark be able

to carry a certain amount of information i.e. capacity. In order to attach a

unique identier to each buyer of an image, a typical watermark should be

able to carry at least 60-100 bits of information. However, most of the work

in watermarking has involved a one bit watermark. That is, at detection a

binary decisionismade astothe presence of the watermark mostoften using

hypothesis testing [3]. Barni [4] encodes roughly 10bits by embedding 1 wa-

termark from a set of 1000 into the DCT domain. The recovered watermark

is the one whichyields the best detector response.

Watermarking methods can be divided into two broad categories: spatial do-

main methods such as [5,6] and transform domain methods . Transform do-

main methods have for the most part focused on DCT[1,4,7], DFT[8,9] and

most recently wavelet domainmethods[1,10,11]. Transform domain methods

haveseveral advantages overspatial domainmethods. Firstly,ithas been ob-

served that in order for watermarks to be robust, they must be inserted into

the perceptually signicant parts of animage.Forimagesthese are the lower

frequencies which can be marked directly if a transform domain approach is

adopted[12]. Secondly,sincecompressionalgorithmsoperateinthefrequency

domain (for example DCT for JPEG and wavelet for EZW) it is possible to

optimizemethodsagainstcompressionalgorithmsas willbeseen insection3.

Thirdly,certaintransformsareintrinsicallyrobusttocertaintransformations.

For example, the DFT domain has been successfully adopted in algorithms

whichattempttorecoverwatermarksfromimageswhichhaveundergoneaÆne

transformations[8].

While transform domain watermarking clearly oers benets, in some cases

it is desireable to specify constraints in another domain (spatial or another

transform domain). In this case the problem is more challenging since it is

morediÆculttogeneratewatermarksinonedomainwhiletakingintoaccount

constraints in another. For example, the problem arises since constraints on

the acceptable level of distortion for a given pixel may be specied in the

spatial domain. In the bulk of the literature on adaptive transform domain

watermarks,a watermark isgenerated inthe transform domainand then the

inverse transform is applied to generate the spatialdomain counterpart.The

watermarkisthen modulatedasafunction ofaspatial domainmaskinorder

to render it invisible. However this spatial domainmodulationis suboptimal

since it changes the original frequency domain watermark. In the case of a

DFTdomainwatermark, multiplicationby a maskinthe spatialdomaincor-

responds to convolution of the magnitude of the spectrum. Unfortunately, to

correctlyaccountfortheeectsofthemaskatdecodingadeconvolutionprob-

lemwouldhavetobesolved.ThisisknowntobediÆcultandtoourknowledge

(4)

proposed in the literature simply ignore the eects of the mask at decoding.

One alternative whichhas recently appeared isthe attemptat specifyingthe

mask directly in the transform domain and ignoring spatial domain masking

[1]. However other authors (e.g. Swanson [13]). have noted the importance of

masking in the spatial domain even after afrequency domain mask has been

applied. It should be noted that masking in one domain is not easily formu-

latedsincedeningaspatialmaskinuencesafrequency maskandvice-versa.

Inthispublicationwedevelopanewapproachforthemathematicalmodelling

of the embedding process. In particular, we derive an optimized strategy for

embedding a watermark in the wavelet and DCT domains when the mask-

ingconstraints are specied in the spatial domain. In fact, the key idea is to

optimize the encoding of the watermark with respect to the detector while

using all available information about the image. This framework overcomes

the problems with many proposed algorithmswhich adopt asuboptimalspa-

tialdomaintruncationandmodulationasdeterminedbymaskingconstraints.

Furthermore we willdevelop an algorithm which is image dependent. Unlike

many of the embedding strategies described inthe literature which treat the

image asnoise possibly modelledby a probability distribution,the algorithm

we describe uses information about the image at embedding. We consider

only the problemof generating watermarks which are robust against attacks

that do not change the geometry of the image. We will work with an 80 bit

watermark which corresponds to a capacity suÆcient for most watermarking

applications.Webegin insection 2by presenting the spatialdomain masking

methods we adopt in the rest of the paper. In section 3 the embedding algo-

rithmis described and applied tothe case of DCTdomainembedding.Then,

in section 4 we derive a new channel coding strategy which greatly improves

the performance of the underlying algorithm. In section 5 we show how the

algorithmcan be applied in the wavelet domain. In section 6 we present our

resultsandacomparisonof theDCTandwavelet domainalgorithmsfollowed

by the conclusion insection 7.

2 Spatial Domain Masking

Recently Voloshynovskiy proposed a spatialdomain texture masking method

based where the image is rst modelled as the sum of the localmean and an

errorterm,the latterofwhichismodelledby ageneralizedGaussiandistribu-

tionasdetailedin[14].Anoisevisibilityfunction(NVF)ateachpixelposition

is thenobtained as:

NVF(i;j)=

w(i;j)

w(i;j)+ 2

x

; (1)

(5)

where w(i;j) = [()]

1

kr(i;j)k 2

and r(i;j) =

x(i;j) x(i;j)

x

,() = (

3

)

( 1

)

and

(t) = R

1

0 e

u

u t 1

du is the gamma function. The parameter is called the

shape parameter which is in the range 0:3 1, and x(i; j) is the local

mean calculated ina 33 window.

The particularities of this model are determined by the shape parameter

and the global image variance 2

x

. To estimate the shape parameter, we use

the moment matching method in [15,16]. The shape parameter for most real

imagesisintherange0:3 1.Oncewehavecomputedthenoisevisibility

function we can obtainthe allowable distortions by computing:

pi;j

=(1 NVF(i;j))S+NVF(i;j)S

1

(2)

whereS

0

and S

1

are themaximum allowablepixeldistortionsintexturedand

at regionsrespectivelyTypically S

0

may beashigh as30while S

1

isusually

about 3. We note that in at regions the NVF tends to 1 so that the rst

term tends to0 and consequently the allowable pixel distortionisat most S

1

whichissmall.Intuitivelythismakessensesinceweexpectthatthewatermark

distortions will be visible in at regions and less visible in textured regions.

Examples of NVFs for two images are given in gure 2. We note that the

modelcorrectly identies textured and at regions. In particular the NVF is

close to0 in texturedregions and close to1 in at regions.

While this model accurately models textures, the importance of luminance

masking has also been noted in the literature. In particular at high lumi-

nance levels the sensitivityof the HVS follows Weber's lawwhichstates that

Æl

l

=k

Weber

whereÆl isthelocalchangeinluminance andlisthe luminanceof

thebackground.Atlowerluminancelevelsthe HVSismoresensitivetonoise.

Osberger [17] uses the DeVries-Rose law at low luminance levels (typically

<l

th

=10cd=m 2

)which statesthat Æl

l

= q

l

l

th k

Weber

.The completecurve is

shown in 2. The x-axis contains the luminance between 0 and 255 while the

y-axisindicates the contrast sensitivitythreshold (CST)giveninterms ofthe

change in luminance divided by the luminance. In order toincorporate lumi-

nancemasking intothe modelwe propose multiplyingthe texture component

by (1+kCST(x

i;j

))to obtain

pi;j

=(1+kCST(x

i;j

))(1 NVF(i;j))S

0

+NVF(i;j)S

1

(3)

Wedonotmultiplythenon-texturecomponentsinceexperimentsindicatethis

becomes visible when increased. Experiments indicate that choosing k = 5

yieldsgoodresults.This correspondstoincreasing theallowable distortionby

5in textured areas wherethe luminance level ishigh.

(6)

50 100 150 200 250 50

100

150

200

250

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

(c)

50 100 150 200 250

50

100

150

200

250 0.1

0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

(d)

Fig.1.Originalimages ofBarbara (a)andFish(b)along withtheirNVF asdeter-

minedbyageneralized gaussian model(c) and (d).

0 50 100 150 200 250

0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08

luminance

contrast sensitivity threshold

Fig.2.Sensitivityofthe HVSto changes inluminance

3 Problem Formulation

Havingderived the spatialdomainmaskingmethods, wenowmathematically

formulate the embedding process as a constrained optimization problem.We

assume that we are given an image to be watermarked denoted I. If it is an

(7)

ing function V(I) which returns 2 matrices of the same size of I containing

thevalues

pi;j

and

ni;j

correspondingtothe amountby whichpixelI

i;j can

be respectively increased and decreased without being noticed. We note that

these are not necessarily the same since we also take into account truncation

eects.Thatispixelsare integersinthe range0 255 consequently itispossi-

bletohaveapixelwhosevalueis1whichcan beincreasedby alargeamount,

but can be decreased by at most 1. In the general case, the function V can

beacomplexfunctionoftexture,luminance,contrast,frequency andpatterns,

however we choose to use the masking functions described in section 2. We

wishtoembedm=(m

1

;m

2 :::m

M

)wherem

i

2f0;1gandM isthe numberof

bitsinthemessage. Ingeneral,thebinary messagemayrst beaugmentedby

a checksum and/or coded using error correction codes to produce a message

m

c

of length M

c

= 512. Without loss of generality we assume the image I

is of size 128128 corresponding to a very small image. For larger images

the same procedure is adopted for each 128128 large block. To embed the

message, we rst divide the image into 88 blocks. In each 88 block we

embed 2 bits from m

c

. In order to embed a 1 or 0 we respectively increase

or decrease the value of a DCT coeÆcient in order to change the sign of the

coeÆcientifnecessary.OncetheDCTdomainwatermarkhas beencalculated,

wecompute theinverse DCTtransformandadd ittotheimageinthe spatial

domain.Atdecoding,wetake thesign oftheDCTcoeÆcient,apply the map-

pings (+! 1),( ! 0) and then decode the BCH codes to correct possible

errors.

Thecentralproblemwith thisschemeisthat duringembeddingwewouldlike

toincreaseordecreasethe DCTcoeÆcientsasmuchaspossiblefor maximum

robustness, but we must satisfy the constraints imposed by V in the spa-

tial domain. In order to accomplish this, we formulate the problem for each

88 block, as a standard constrained optimization problem as follows. For

each block we select 2 mid-frequency coeÆcients in which we willembed the

informationbits. Wethen have:

min

x f

t

x ; Axb (4)

x = [x

11 :::x

81 x

12 :::x

82 :::x

18 :::x

88 ]

t

is the vector of DCT coeÆcients ar-

rangedcolumnby column.f isavector ofzeros exceptinthe positionsofthe

2selectedcoeÆcientswhereweinserta 1or1dependingonwhetherwewish

torespectivelyincrease ordecrease the value ofthe coeÆcients asdetermined

by m

c

. Axb contains the constraints which are partitioned as follows.

A= 2

6

6

6

6

6

4

IDCT

IDCT 3

7

7

7

7

7

5

; b = 2

6

6

6

6

6

4

p

n 3

7

7

7

7

7

5

(5)

(8)

x (with elements of the resulting image arranged column by column in the

vector). We take

p

and

n

to be column vectors where the elements are

taken column wise from the matrices of allowable distortions. Stated in this

formthe problemis easily solved by the wellknown Simplex method. Stated

as such the problem only allows for spatial domain masking, however many

authors[18]suggest alsousing frequency domainmasking.This ispossibleby

addingthe following constraints:

LxU (6)

HereLandU arethe allowablelowerand upperboundsontheamountweby

which wecan changea given frequency component.The Simplex methodcan

alsobe used tosolve the problemwith added frequency domain constraints.

Wenotethatbyadoptingthisframework,weinfactallowall DCTcoeÆcients

tobemodied (ina given 88block) even though we are only interested in

2 coeÆcients at decoding. This is a novel approach which has not appeared

in the literature. Other publications select a subset of coeÆcients to mark

while leaving the rest unchanged. This is necessarily suboptimal relative to

our approach.We arein facttryingto maximizethe detectorresponse within

spatio-frequency percitibilitybounds.

4 Watermark Embedding Based on Magnitude

RatherthancodingbasedonthesignofacoeÆcientasin[7],weproposeusing

themagnitudeof thecoeÆcient.Toencode a1wewillincreasethe magnitude

ofacoeÆcient andtoencode a0wewilldecrease themagnitude.Atdecoding

athreshold T willbechosen againstwhich themagnitudes of coeÆcientswill

be compared. The coding strategy is summarized in table 1 where c

i

is the

Table 1

MagnitudeCoding

sign(c

i

) bit Coding

+ 0 decrease c

i

(setL to stop at 0)

0 increasec

i

(set U to stop at 0)

+ 1 increasec

i

1 decrease c

i

selected DCT coeÆcient. The actual embedding is performed by setting f in

equation 4based on whether we want toincrease or decrease a coeÆcient.

(9)

the image is no longer treated as noise. As noted by Cox [19] this is an im-

portant characteristic of the potentially most robust schemes since a priori

informationonthe informationisused tomaximizedecoderresponse. Clearly

the best schemes should not treatthe image asnoise since itis known atem-

bedding.Inour case, basedonthe observed image DCTcoeÆcientwe encode

asindicated intable 1.Atdecoding theimage isonce againnot noise since it

contributes to the watermark. Another important property of this scheme is

that it is highly image dependent. This is an important property if we wish

to resist against the watermark copy attack [20] in which a watermark is es-

timated from one image (tyically by denoising) and added to another image

to produce a fake watermark. If this is done, the watermark will be falsely

decoded since at embedding and decoding the marked image is an integral

part of the watermark. Consequently changing the image implies changing

the watermark.

It is alsopossibleto incorporateJPEG quantization tables intothe model in

order to increase the robustness of the algorithm. Assume for example that

wewould liketoaimfor resistance tocompressionatJPEGquality factor10.

Table 2contains the thresholdvalue belowwhichagiven DCTcoeÆcientwill

beset to0.In orderto improvethe performance of the algorithmwecan add

Table 2

Thresholdsat JPEGqualityfactor 10

30 30 30 40 60 100 130 130

35 35 35 50 65 130 130 130

40 35 45 45 65 130 130 130

40 45 60 75 130 130 130 130

50 55 95 130 130 130 130 130

60 90 130 130 130 130 130 130

125 130 130 130 130 130 130 130

130 130 130 130 130 130 130 130

boundsbased onthevaluesintable2tothe amountwe increase acoeÆcient.

In particular, if we wish to embed a 1 we need only increase the magnitude

of a coeÆcient to the threshold given in table 2 in order for it to survive a

compression atquality factor 10.This isaccomplished by setting the bounds

L and U. Since 2 bits are embedded per block, the remaining energy may

be used to embed the other bit. It is important to note that it may not be

possibletoachievethe thresholdsince ourvisibilityconstraintsasdetermined

by V inthe spatial domain must not beviolated, however the algorithmwill

embed asmuchas much energy as possibly via the minimizationin equation

4. We note that we choose onlytoembed the watermarkin randomlychosen

(10)

willrequire more energy to besure that the coeÆcient survives atlowJPEG

compression. We avoid the 4 lowest frequency components in the upper left

hand part of the DCT block since these tend to be visible even with small

modications.

5 Wavelet Domain Embedding

In order to embed the message, in the wavelet domain, we perform a similar

optimization as the one performed in the DCT domain. We rst divide the

imageinto1616blocksand perform the 1-levelwavelet transform.In order

toembed a1 or0weadopt adierentialencoding strategyinthe lowest sub-

band(LL).In particularwechoose fourneighbouringcoeÆcientsandincrease

two coeÆcients while decreasing the other two. The choice of which two to

increase or decrease is a function of whether we wish to encode a 1 or a 0

sothat atdecoding we take the dierencebetween the sums of the twopairs

of coeÆcients and apply the mappings (+ ! 1),( ! 0). We note that it

is important to select a 22 block of neighbouring coeÆcients since the un-

derlying assumption is that the dierenceon average is 0. In order to embed

the largest possible values while satisfying masking constraints, the problem

is formulated for each 1616 block as a constrained optimization problem.

In the case of the Haar wavelet, for a 1616 block, we have 64 coeÆcients

available in the LL subband. In each block we encode 8 bits by selecting 32

coeÆcients grouped into 8 22 blocks. We then have equation 4 as before

however x =[x

1;1 :::x

16;1 x

12 :::x

16;2 :::x

1;16 :::x

16;16 ]

t

is the vector of coeÆ-

cientsarrangedcolumnbycolumn.Furthermore,f isavectorof zerosexcept

in the positions of the selected coeÆcients where we insert a ( 1) or (1) de-

pending on whether we wish torespectively increase or decrease the value of

acoeÆcient.The constraints are now partitionedas:

A= 2

6

6

6

6

6

4

IDWT

IDWT 3

7

7

7

7

7

5

; b= 2

6

6

6

6

6

4

p

n 3

7

7

7

7

7

5

(7)

where IDWT is the matrix which yields the 2D inverse DWT transform of

x (with elements of the resulting image arranged column by column in the

vector). We also note that we take

p

and

n

to be column vectors where

the elementsare taken columnwise fromthe matricesof allowable distortions.

Theproblemisonce againsolved by the Simplexmethod.Furthermore,extra

constraints in the frequency domain can also be incorporated as before via

equation6.Unfortunately,inthiscaseitisnotpossibletooptimizethemethod

(11)

the DCT domain.

6 Results

Both algorithms based on magnitude coding were tested on 5 small images.

These were Lena, Bear, Girl, Boat, and Watch which were all resized to

128 128. Prior to embedding the 80 bit message, we rst append a 20

bit checksum and then encode the message using turbo codes [21] to yield

a binary message of length 512. Turbo codes provide near optimum perfor-

mance for Gaussian channels and are consequently superior to other codes

usedcurrentlyinwatermarking (mostlyBCH and convolution).Wenote that

even thoughthis channelisnot Gaussian,tests indicatethatturbocodesout-

perform BCH codes [22]. In fact, JPEG compression introduces quantization

noise which is diÆcultto model. However, the development of optimalcodes

for quantization channels is well beyond the scope of this paper, but is dis-

cussed by Eggers [23]. The 20 bit checksum is essential in determining the

presence of the watermark. At detection if the checksum is veried we can

safelysay (withprobability 1

2 20

of error)that awatermarkwasembeddedand

successfully decoded.

With respect to wavelet domain watermarking, both the Haar wavelet and

the Daubechies 4-tap lter were tested. In the case of the Haar wavelet, the

algorithm was resistant down to a level of 70% JPEG quality factor. Better

results were obtained for the 4-tap Daubechies lter where the algorithm is

robust down to a level of 50% quality factor and is resistant as well to low

and high pass ltering. Byresistant, we understand that all the bits are cor-

rectly decoded and the checksum veried. We note that for the case of the

Daubechies 4-tap lter, some minor modications must be made to the em-

bedding strategy. In particular, when taking the inverse DWT we obtain a

block size which is bigger than the original block. These boundary problems

are well known in the wavelet literature. The diÆculties are easily overcome

by imposing that the extra boundary pixels be constrained to be 0. This is

done in practice by setting the appropriate values in

p

and

n

to 0:1 and

0:1respectively.Wedonot set theseallthewaytozerosinceoftenthis leads

to an overly constrained problem. An example is given in gure 3 where the

originalimage (128128), watermarked image (Daubechies 4-tap lter)and

watermark (dierence between originaland watermarked) are presented. We

observe that the watermark is stronger in textured regions as expected. We

note that the watermark is slightlyvisiblealong the long vertical edge tothe

left of the image. This is a limitation of the visibility model which does not

take into account the high amount of structure to which the eye is particu-

larly sensitive. In order to overcome this problem more sophisticated models

(12)

20 40 60 80 100 120 140 160 180 200

(a)

20 40 60 80 100 120 140 160 180 200 220

(b)

−15

−10

−5 0 5 10 15

(c)

Fig. 3. Originalimage Lena(a) along with watermarked image (b) and watermark

in(c)=(a)-(b).

are being developed which take into account the presence of lines in the im-

age. In these regions, the allowable distortion must be reduced. Maximizing

thestrengthofthe watermarkwhileminimizingvisibilityinanautomaticway

over a wide range of images is a delicate problem since each image is unique

and presents itsown diÆculties.

On a Pentium 233MHZ computer the algorithm takes 20 minutes to embed

the watermark. This time is non-negligible.The problem arises from the fact

that a formidable optimization problem must be solved at embedding. That

is at each block we have 21616 = 512 constraints. On the other hand

the optimization ineach block is independent once the global mask has been

calculated. Consequently the algorithmcan be carriedout inparallel.

(13)

far superior than for the wavelet domain. Indeed, it is possible to recover

80 bits after compression at JPEG quality factor 10% for a 128128. This

suggeststhatthereismuchtobegainedbymatchingthe transformdomainof

thewatermarkwith thetransformdomainwherecompressiontakesplace.We

note that the resultingDCT watermarked imageis visually indistinguishable

fromthewaveletdomainwatermarkedimagepresentedingure3.Thisresults

from the fact that the maximal distortions in both cases are specied by the

same spatial domain mask. Once again, as with wavelet domain embedding,

DCT domain embedding requires roughly 20 minutes for a 128128 image.

Unfortunately, the algorithm cannot be applied to a full frame DFT. The

problemliesinthe excessivecomputationalload.Fora128128image,if we

wish to structure the embedding problem in the magnitude of the DFT, we

willhave 1281282=32;768 constraintswhich is overwhelmingand more

importantly,itis impossibleto adapttolocalfrequency charactersiticsof the

image, inducingpoor imperceptibility.

7 Conclusion and Further Research Directions

In this article we have described a new mathematicalmodel which describes

theprocess ofembeddingawatermarkinatransformdomainwhenthemask-

ing constraints are specied in the spatial domain. This model has 5 charac-

teristicswhich make itextremely appealing:

(1) The algorithmis extremely exible inthat constraints asdetermined by

masking functions can be easily incorporated in the spatial domain and

any linear transform domain may be used although here we considered

the special cases of the Haar and Daubechies wavelets as well as DCT

domainembedding.Also,extraconstraintsmaybeaddedinthefrequency

domain.

(2) Weshowhowtohandleproblems withtruncationinanoptimalwayand

propose the novel approachof modifying allcoeÆcientseven though we

are only interested in asubset.

(3) The algorithmsresist well against JPEGcompression and we observe in

particular that matching the embedding domain with the compression

domain and incorporating JPEG quantization tables at the embedding

stage leads toconsiderable gains.

(4) Thealgorithmgenerates anon-additiveand imagedependent watermark

whichresists the watermark copy attack [20].

(5) At the embedding stage the image is not treated as noise which is an

important property of the most robust watermarking schemes as noted

by Cox [19]. In fact the algorithm uses available information about the

image atthe embeddingstage to maximizethe decoder response.

(14)

ing within this framework, many new research directions arise. We note ve

possiblities inparticular:

(1) Whilethe DCTdomainalgorithmresistswellagainstJPEGcompression

furtherresearchisneededinordertoadaptthewavelet domainapproach

so that itis resistant againstEZW and SPIHT compression.

(2) Workis currently alsounder way to apply the ideas of [8] so asto make

the algorithmresistant to geometric changes aswell.

(3) Another topic of further research is the incorporation of more sophisti-

cated spatial domain masks. Most of the masks proposed in the water-

markingliterature modeltexture,luminanceand/orfrequency. Osberger

[17] howeveridenties several higherorder factors which have been used

to weight distortion metrics (typically the distortion produced by com-

pressionalgorithms). The most importantfactors are:

Contrast: Regions which have a high contrast with their surrounds

attractour attention and are likely tobe of greatervisualimportance.

Size:Largerregionsattractour attention morethansmalleroneshow-

ever a saturation point exists after which the importance due to size

levels o.

Shape: Regions which are long and thin (such as edges) attract more

attention than round at regions.

Colour:Someparticular colours(red) attractmore attention. Further

more the eect is more pronounced when the colour of aregion is dis-

tinct fromthat of the background.

Location: Humans typically attach more importanceto the center of

animage.

Foreground/Background: Viewers are more interested inobjects in

the foreground than those in the background.

People:Manystudieshaveshownthatwearedrawntofocusonpeople

ina scene and inparticular their faces, eyes, mouthand hands.

We note that these factors are specied in the spatial domain and not

easily converted to the frequency domain. Further work could involve

incorporating these elements in the attempt to generate more accurate

spatial domainmasks althoughdetection of theseelementsis diÆcultto

automate.

(4) While some work has been done in capacity (e.g. [24]) the bulk of the

results concern additive watermarks. An interesting topic of further re-

search is the calculation of the capacity of the proposed non-additive

scheme.

(15)

Weare gratefultoDr.AlexanderHerrigeland DigitalCopyrightTechnologies

fortheirworkonthesecurityarchitectureforthedigitalwatermarkandforthe

ongoing collaboration. We also thank Frederic Deguillaume for many fruitful

discussions. This workis nanced by the Swiss Priority ProgramonInforma-

tion and Communication Structures (project Krypict) and by the European

EspritOpen MicroprocessorInitiative(projectJEDI-FIRE).Thisworkispart

of the European Patent applicationEU 978107084.

References

[1]C. I. Podilchuk and W. Zeng, \Image-adaptive watermarking using visual

models,"IEEEJournal onSelectedAreasin Communications16,pp.525{539,

May 1998.

[2]F.A.P.PetitcolasandR.J.Anderson,\Attacksoncopyrightmarkingsystems,"

in 2nd International Information Hiding Workshop, pp. 219{239, (Portland,

Oregon, USA), April1998.

[3]G. Voyatzis and I. Pitas, \The use of watermarks in the protection of digital

multimediaproducts,"Proceedings of the IEEE87, July1999.

[4]M. Barni, F. Bartolini, V. Cappellini, A. Piva, and F. Rigacci, \A

M.A.P.identicationcriterionforDCT-basedwatermarking,"inEUSIPCO'98,

(Rhodes, Greece), September 1998.

[5]W.Bender,D.Gruhl,andN.Morimoto,\Methodandapparatusfordatahiding

inimages,"U.S. Patent # 5689587 ,1996.

[6]I. Pitas, \A method forsignaturecasting on digitalimages,"in Proceedings of

the IEEE Int. Conf. on Image Processing ICIP-96, pp. 215{218, (Lausanne,

Switzerland),Sept.16-19 1996.

[7]S. Pereira and T. Pun, \A framework for optimal adaptive dct watermarks

using linear programming," in Tenth European Signal Processing Conference

(EUSIPCO'2000), (Tampere, Finland), sep5{8 2000.

[8]S. Pereira and T. Pun, \Fast robust template matching for aÆne resistant

watermarks," in 3rd International Information Hiding Workshop, (Dreseden,

Germany), September1999.

[9]M. Barni, F. Bartolini,A. D.Rosa, and A. Piva,\Capacity ofthe watermark-

channel: How many bits can be hidden within a digital image ?," in SPIE:

Security and Watermarking of Multimedia Contents, vol. 3657, pp. 437{448,

(SanJose,California),January 1999.

(16)

technique for spatio-frequency masking of digital signatures," in Security and

Watermarking of Multimedia Contents, P. W. Wong and E. J. Delp, eds.,

vol. 3657, pp. 31{39, The Society forImagingScience and Technology (IS&T)

andtheInternationalSocietyforOpticalEngineering(SPIE),SPIE,(SanJose,

California,U.S.A.), 25{27Jan. 1999.

[11]W.Zhu,Z.Xiong,andY.Q.Zhang,\Multiresolutionwatermarkingforimages

and video," IEEETransactions on Circuits and Systems for Video Technology

9,pp.545{550, June1999.

[12]I. Cox, J. Killian, T. Leighton, and T. Shamoon., \Secure spread spectrum

watermarking for images, audio and video.," in Proceedings of the IEEE Int.

Conf. on Image Processing ICIP-96, pp. 243{246, (Lausanne, Switzerland),

1996.

[13]M. D.Swanson,B. Zhu,and A. H.Tewk, \Multiresolution scene-basedvideo

watermarking using perceptual models," IEEE Journal on Selected Areas in

Communications 16, pp.540{550, May1998.

[14]S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, \A

stochastic approach to content adaptive digital image watermarking," in

Third International Workshop on Information Hiding, (Dresden, Germany),

September29 - October1st1999.

[15]S. Mallat, \A theory for multiresolution signal decomposition: the wavelet

representation," IEEETrans. PAMI11, pp.674{693, 1989.

[16]D. Kazmer, P. Barkan, and K. Ishii, \Quantifying design and manufacturing

robustness through stochastic optimization techniques," in ASME Design

EngineeringTechnical Conferences and Computers inEngineering Conference,

96-DETC/DAC-1600, (Irvine, California),August 1996.

[17]W. Osberger, N. Bergmann, and A. J. Maeder, \An automatic image quality

assessment technique incorporating higher level perceptual factors," in IEEE

ICIP-98, (Chicago,USA),October1998.

[18]M. D. Swanson, B. Zhu, and A. Tewk, \Robust data hiding for images,"

in 7th IEEE Digital Signal Processing Workshop, pp. 37{40, (Loen, Norway),

September1996. G:WM1-A23.

[19]I.J.Cox,M.L.Miller,andA.L.McKellips,\Watermarkingascommunications

withsideinformation," Proceedings of the IEEE87,pp.1127{1141, July1999.

[20]M. Kutter, S. Voloshynovskiy, and A. Herrigel, \Watermark copy attack," in

IS&T/SPIE's12th AnnualSymposium, Electronic Imaging 2000: Security and

Watermarking of Multimedia Content II, P. Wah Wong and E. J. Delp, eds.,

vol. 3971 of SPIEProceedings, (SanJose,CaliforniaUSA), 23{28 jan2000.

[21]C. Berrou and A. Glavieux, \Near optimum error correcting coding and

decoding:turbo-codes," IEEETrans. Comm.,pp. 1261{1271, October1996.

(17)

watermarking based on a stochastic multiresolution image modeling," in

EUSIPCO 2000,(Tampere, Finland), submitted2000.

[23]J.J.EggersandB.Girod,\Quantizationeectsondigitalwatermarks,"Signal

Processing,submitted 2000.

[24]S. Servetto, C. Podilchuk, and K. Ramchandran, \Capacity issues in digital

image watermarking," in IEEE Int. Conference on Image Processing

98

Proceedings, Focus Interactive Technology Inc., (Chicago, Illinois, USA),

October1998.

Références

Documents relatifs

Fourier analysis is by far the most used tool in audio DSP: it enables to map audio signal into the frequency domain, amd one knows very fast algo- rithms to do it with discrete

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

Image restoration using sparse approximations of spatially varying blur operators in the wavelet domain.. Paul Escande 1 , Pierre Weiss 1 , and Franc¸ois

The study of the lack of compactness in the critical embedding of Sobolev spaces supplies us with a large amount of information about solutions of nonlinear partial

Construisez une ligne perpendiculaire au segment passant par le point sans ´

This paper proposes a natural language processing (NLP) approach based on linear transformation of word embedding spaces.. Word embedding is a vector representation of a word capable

In many systems, the observed image can result from the convolution of the true image and the point spread function (PSF) contaminated by noise from various sources. The goal of