Threshold Selection Method for Capacity Optimization of the Digital Watermark Insertion

디지털 워터마크의 삽입용량 최적화를 위한 임계값 선택방법

  • 이강승 (동의대학교 공과대학 컴퓨터공학과) ;
  • 박기범 ((주) 메타라이츠)
  • Published : 2009.01.30

Abstract

In this paper a watermarking algorithm is proposed to optimize the capacity of the digital watermark insertion in an experimental threshold using the characteristics of human visual system(HVS), adaptive scale factors, and weight functions based on discrete wavelet transform. After the original image is decomposed by a 3-level discrete wavelet transform, the watermarks for capacity optimization are inserted into all subbands except the baseband, by applying the important coefficients from the experimental threshold in the wavelet region. The adaptive scale factors and weight functions based on HVS are considered for the capacity optimization of the digital watermark insertion in order to enhance the robustness and invisibility. The watermarks are consisted of gaussian random sequences and detected by correlation. The experimental results showed that this algorithm can preserve a fine image quality against various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, sharpening, linear and non-linear filtering, etc.

본 논문은 웨이블릿 영역에서 인간지각시스템 특성, 적응 스케일(Scale) 개수와 가중치 함수를 이용하고 실험적 임계값을 적용하여 디지털 워터마크의 삽입용량 최적화를 위한 디지털 워터마킹 알고리즘을 제안하였다. 실험적 임계값을 기초로 하여 웨이블릿 영역에서 중요 계수를 찾아 디지털 워터마크의 삽입용량 최적화를 위한 워터마크를 삽입하였다. 원본영상을 3-레벨(Level)로 웨이블릿 변환하여, 저주파에 해당하는 기저대역을 제외한 나머지 모든 부대역을 워터마크 정보를 삽입하였다. 디지털 워터마크의 삽입용량 최적화를 위하여 인간시각시스템 특성을 근거로 한 적응 스케일 계수와 가중치 함수는 고려되었으며, 이 적응 스케일 계수와 가중치 함수는 강인성과 비가시성의 향상을 도모하였다. 워터마크는 가우시안 랜덤 시퀀스로 구성되어 있고 워터마크의 검출은 상관도를 이용하여 워터마크의 삽입 여부를 판단한다. 본 논문에서 제안한 방법으로 모의 실험한 결과 비교적 우수한 화질에서 JPEG 손실 압축, 잡음 첨가, 잘라내기, 흐림, 예리화, 그리고 선형 및 비선형 필터링 등의 공격에 강인함을 알 수 있었다.

Keywords

References

  1. H. Berghel, "Protection Owner Ship Rights through Digital Watermarking," IEEE Computer Magazine, pp. 101-103, July 1996.
  2. S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Stegannograpphy and Digital Watermarking, Artech House, 2000.
  3. I. Cox, M. Miller and J. Bloom, Digital Watermarking, Academic Press, 2002.
  4. N. Johnson, Z. Duric and S. Jajodia, Information Hiding: Steganography and Watermarking Attacks and Countermeasures, Kluwer Academic Publishers, 2001.
  5. X. Xiao; X. Sun and M. Chen, "Second-LSB-Dependent Robust Watermarking for Relational Database," IEEE Third International Symposium on Information Assurance and Security 2007, pp. 292-300, August 2007.
  6. N. Agarwal and A. Goyal, "Robust Watermarking in Transform Domain using Edge Detection Technique," IEEE International Conference on Computational Intelligence and Multimedia Applications 2007, pp. 59-63, December 2007.
  7. E. First and X. Qi, "A Composite Approach for Blind Grayscale Logo Watermarking," IEEE 2007 ICIP, Vol. 3, pp. 265-268, September 2007.
  8. A. Venkataramana and P. Raj, "Image Watermarking Using Krawtchouk Moments," IEEE ICCTA'07, pp. 676-680, March 2007.
  9. Y. Lin, H. Huang, and W. Hsu, "An Embedded Watermark Technique in Video for Copyright Protection," IEEE ICPR'06, Vol. 4, pp. 795-798, 2006.
  10. J. Ohnishi and K. Matsui" Embedding a Seal into a Picture under Orthogonal Wavelet Transform," Proceedings of the Third IEEE International Conference on Multimedia Computing and System 1996, pp. 514-521, 1996.
  11. C. Hus and J. Wu, "Multiresolution Watermarks for Digital Images," IEEE Trans. Circuits Syst. II, Vol. 8, No. 8, pp.1097-1101, Aug. 1998.
  12. A. Said and W. Pearlman, "A New Fast and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees", IEEE Trans. on Circuits and Systems for Video Technology, Vol. 6, June 1995.
  13. R. Dugad, K. Ratakonda and N. Ahuja, "A New Wavelet-based Scheme for Watermarking Images," Proc. of IEEE ICIP '98, Chicago, IL, USA. October 1998.
  14. H. Wang, P. Su and C. Kuo, "Wavelet-based Digital Image Watermarking," Optics Express, p.497, Dec., 1998.
  15. S. Oh, H. Lee and K. Lee, "A Wavelet Transform based Watermarking for Digital Signatures," Proc. ITU-CSCC 2000, pp. 857-860, 2000.
  16. A. Kerckhoffs. "La Cryptographic Militaire," Journal des sciences militaires, Vol. 9, pp. 5-38, January 1883.
  17. M. Kutter and F. Petitcolas. "A Fair Benchmark for Image Watermarking Systems," In Ping Wah Wong and Edward J. Delp. editors, proceedings of electronic imaging '99, security and watermarking of multimedia contents, Vol. 3657, pp. 226-239, January 1999.
  18. G. Langelaar, R. Lagendijk and J. Biemond, "Real-time labeling of MPEG-2 compressed video", Jour. of Visual Comm. Image Representation, Vol. 9, December 1998
  19. M. Miller and J. Bloom, "Computing the Probability of False Watermark Detection," Proceeding of Workshop on Information Hiding, pp. 1-15, 1999.
  20. A. Lewis and G. Knowles, "Image Compression Using the 2-D Wavelet Transform." IEEE Trans. Image Processing, Vol. 1, No. 2, pp. 244-250, April 1992. https://doi.org/10.1109/83.136601
  21. M. Antonini, M. Barlaud, P. Mathieu and I. Daubechies, "Image Coding Using Wavelet Transform," IEEE Trans. Image Processing, Vol. 1, No. 2, pp. 205-220, April 1992. https://doi.org/10.1109/83.136597