03.06.2013 Views

Combinational image watermarking in the spatial and frequency ...

Combinational image watermarking in the spatial and frequency ...

Combinational image watermarking in the spatial and frequency ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Pattern Recognition 36 (2003) 969 – 975<br />

www.elsevier.com/locate/patcog<br />

<strong>Comb<strong>in</strong>ational</strong> <strong>image</strong> <strong>watermark<strong>in</strong>g</strong> <strong>in</strong> <strong>the</strong> <strong>spatial</strong><br />

<strong>and</strong> <strong>frequency</strong> doma<strong>in</strong>s<br />

FrankY. Shih ∗ , Scott Y.T. Wu<br />

Computer Vision Laboratory, Department of Computer Science, New Jersey Institute of Technology, Newark, NJ 07102, USA<br />

Abstract<br />

Received 15 February 2002; received <strong>in</strong> revised form 24 April 2002; accepted 30 May 2002<br />

In order to provide more watermarks <strong>and</strong> to m<strong>in</strong>imize <strong>the</strong> distortion of <strong>the</strong> watermarked <strong>image</strong>, a novel technique us<strong>in</strong>g<br />

<strong>the</strong> comb<strong>in</strong>ational <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong> doma<strong>in</strong>s is presented <strong>in</strong> this paper. The splitt<strong>in</strong>g of <strong>the</strong> watermark<strong>image</strong> <strong>in</strong>to two<br />

parts, respectively, for <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong> <strong>in</strong>sertion relies on <strong>the</strong> user’s preference <strong>and</strong> data importance. Experimental results<br />

provide <strong>the</strong> comparisons when di erent sized watermarks are embedded <strong>in</strong>to a grayscale <strong>image</strong>. The proposed comb<strong>in</strong>ational<br />

<strong>image</strong> <strong>watermark<strong>in</strong>g</strong> possesses <strong>the</strong> follow<strong>in</strong>g advantages. More watermark data can be <strong>in</strong>serted <strong>in</strong>to <strong>the</strong> host <strong>image</strong>, so that<br />

<strong>the</strong> capacity is <strong>in</strong>creased. The splitt<strong>in</strong>g of <strong>the</strong> watermark<strong>in</strong>to two parts makes <strong>the</strong> degree of protection double. The splitt<strong>in</strong>g<br />

strategy can be designed even more complicated to be unable to compose. Fur<strong>the</strong>rmore, to enhance robustness, a r<strong>and</strong>om<br />

permutation of <strong>the</strong> watermarkis used to defeat <strong>the</strong> attacks of signal process<strong>in</strong>g, such as <strong>image</strong> crops.<br />

? 2002 Published by Elsevier Science Ltd on behalf of Pattern Recognition Society.<br />

Keywords: Image process<strong>in</strong>g; Image <strong>watermark<strong>in</strong>g</strong>; Compression; Security; Encryption; Signal process<strong>in</strong>g<br />

1. Introduction<br />

Digital <strong>image</strong>s, video, <strong>and</strong> audio have revolutionized <strong>in</strong><br />

<strong>the</strong> way of largely stored, manipulated, <strong>and</strong> transmitted. It<br />

gives rise to a wide range of applications <strong>in</strong> electronics, enterta<strong>in</strong>ment<br />

<strong>and</strong> medial <strong>in</strong>dustry [1]. Creative ways of stor<strong>in</strong>g,<br />

access<strong>in</strong>g <strong>and</strong> distribut<strong>in</strong>g data have generated lots of<br />

bene ts <strong>in</strong>to <strong>the</strong> digital multimedia eld. However, <strong>the</strong>se<br />

bene ts brought with concomitant risks of data piracy. One<br />

of <strong>the</strong> solutions to provide security <strong>in</strong> copyright protection is<br />

<strong>watermark<strong>in</strong>g</strong> which embeds special marks <strong>in</strong> a host <strong>image</strong>.<br />

Digital <strong>watermark<strong>in</strong>g</strong> has been proposed as a way to<br />

identify <strong>the</strong> source, creator, owner, distributor, or authorized<br />

consumer of a document or an <strong>image</strong>. It can also be<br />

used for trac<strong>in</strong>g <strong>image</strong>s that have been illegally distributed.<br />

Watermark<strong>in</strong>g, when complimented by encryption,<br />

∗ Correspond<strong>in</strong>g author. Tel.: +1-973-596-5654; fax: +1-973-<br />

596-5777.<br />

E-mail address: shih@cis.njit.edu (F.Y. Shih).<br />

can serve many purposes <strong>in</strong>clud<strong>in</strong>g copyright protection,<br />

broadcast monitor<strong>in</strong>g, <strong>and</strong> data au<strong>the</strong>ntication.<br />

There are many aspects to be noticed <strong>in</strong> <strong>watermark<strong>in</strong>g</strong><br />

design, for example, imperceptibility, security, capacity <strong>and</strong><br />

robustness. Many researchers have been focus<strong>in</strong>g on security<br />

<strong>and</strong> robustness [2–6], but rarely on <strong>the</strong> <strong>watermark<strong>in</strong>g</strong><br />

capacity [7,8]. Indeed, both security <strong>and</strong> robustness are important<br />

because <strong>the</strong> watermark<strong>image</strong>s are expected to be<br />

irremovable <strong>and</strong> unperceivable. Never<strong>the</strong>less, if we can embed<br />

a large watermark<strong>image</strong> <strong>in</strong>to a host <strong>image</strong>, <strong>the</strong> application<br />

becomes more exible <strong>in</strong> many areas.<br />

There are two methods of perform<strong>in</strong>g <strong>watermark<strong>in</strong>g</strong>, one<br />

<strong>in</strong> <strong>spatial</strong> doma<strong>in</strong>, <strong>and</strong> <strong>the</strong> o<strong>the</strong>r <strong>in</strong> <strong>frequency</strong> doma<strong>in</strong>. Each<br />

technique has its own advantage <strong>and</strong> disadvantage. In <strong>the</strong><br />

<strong>spatial</strong> doma<strong>in</strong> [3,9], we can simply <strong>in</strong>sert watermark<strong>in</strong>to<br />

a host <strong>image</strong> by chang<strong>in</strong>g <strong>the</strong> gray levels of some pixels<br />

<strong>in</strong> <strong>the</strong> host <strong>image</strong>, but <strong>the</strong> <strong>in</strong>serted <strong>in</strong>formation may be easily<br />

detected us<strong>in</strong>g computer analysis. In <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong><br />

[4,5], we can <strong>in</strong>sert watermark<strong>in</strong>to <strong>the</strong> coe cients of<br />

a transformed <strong>image</strong>, for example, us<strong>in</strong>g <strong>the</strong> discrete Fourier<br />

0031-3203/02/$30.00 ? 2002 Published by Elsevier Science Ltd on behalf of Pattern Recognition Society.<br />

PII: S0031-3203(02)00122-X


970 F.Y. Shih, S.Y.T. Wu / Pattern Recognition 36 (2003) 969 – 975<br />

transform (DFT), discrete cos<strong>in</strong>e transform (DCT) <strong>and</strong> discrete<br />

wavelet transform (DWT). But we cannot embed too<br />

much data <strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> because <strong>the</strong> quality of<br />

<strong>the</strong> host <strong>image</strong> will be distorted signi cantly. That is, <strong>the</strong><br />

size of watermarkshould be smaller than <strong>the</strong> host <strong>image</strong>.<br />

Generally, <strong>the</strong> size of watermarkis 1=16 of <strong>the</strong> host <strong>image</strong>.<br />

In order to provide more watermarkdata <strong>and</strong> to m<strong>in</strong>imize<br />

<strong>the</strong> distortion of <strong>the</strong> watermarked <strong>image</strong>, a novel technique<br />

us<strong>in</strong>g <strong>the</strong> comb<strong>in</strong>ational <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong> doma<strong>in</strong>s is<br />

developed <strong>in</strong> this paper. This paper is organized as follows.<br />

In Section 2, we present <strong>the</strong> overview of comb<strong>in</strong>ational <strong>image</strong><br />

<strong>watermark<strong>in</strong>g</strong>. Sections 3 <strong>and</strong> 4 <strong>in</strong>troduce <strong>the</strong> techniques<br />

while embedd<strong>in</strong>g watermark<strong>in</strong> <strong>the</strong> <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong><br />

doma<strong>in</strong>s, respectively. Experimental results are shown <strong>in</strong><br />

Section 5. Section 6 discusses <strong>the</strong> fur<strong>the</strong>r encryption of comb<strong>in</strong>ational<br />

<strong>watermark<strong>in</strong>g</strong>. F<strong>in</strong>ally, <strong>the</strong> conclusions are made<br />

<strong>in</strong> Section 7.<br />

2. Overview of comb<strong>in</strong>ational <strong>image</strong> <strong>watermark<strong>in</strong>g</strong><br />

In order to <strong>in</strong>sert more data <strong>in</strong>to a host <strong>image</strong>, <strong>the</strong> simple<br />

way is to embed <strong>the</strong>m <strong>in</strong> <strong>the</strong> <strong>spatial</strong> doma<strong>in</strong> of <strong>the</strong> host<br />

<strong>image</strong>. However, <strong>the</strong> disadvantage is that <strong>the</strong> <strong>in</strong>serted data<br />

could be detectable by some simple extraction skills. How<br />

can we <strong>in</strong>sert more signals but unperceivable? We address<br />

a new strategy of embedd<strong>in</strong>g large watermarks <strong>in</strong>to a host<br />

<strong>image</strong> by splitt<strong>in</strong>g <strong>the</strong> watermark<strong>image</strong> <strong>in</strong>to two parts. One<br />

is embedded <strong>in</strong> <strong>the</strong> <strong>spatial</strong> doma<strong>in</strong> of a host <strong>image</strong>, <strong>and</strong> <strong>the</strong><br />

o<strong>the</strong>r <strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>.<br />

Let H be <strong>the</strong> orig<strong>in</strong>al gray-level host <strong>image</strong> with size<br />

N × N <strong>and</strong> W be <strong>the</strong> b<strong>in</strong>ary watermark<strong>image</strong> with size<br />

M × M. W 1 <strong>and</strong> W 2 are <strong>the</strong> two separated watermarks from<br />

W: H S is <strong>the</strong> <strong>image</strong> comb<strong>in</strong>ed from H <strong>and</strong> W 1 <strong>in</strong> <strong>the</strong> <strong>spatial</strong><br />

doma<strong>in</strong>. H DCT is <strong>the</strong> <strong>image</strong> where H s is <strong>the</strong> transformed<br />

<strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> by DCT. H F is <strong>the</strong> <strong>image</strong> where<br />

H DCT <strong>and</strong> W 2 are comb<strong>in</strong>ed <strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>. Let ⊕<br />

denote <strong>the</strong> operation that substitutes bits of watermarkfor<br />

least signi cant bits (LSB) of <strong>the</strong> host <strong>image</strong>.<br />

The algorithm of <strong>the</strong> proposed comb<strong>in</strong>ational <strong>image</strong><br />

<strong>watermark<strong>in</strong>g</strong> is presented below. Its owchart is shown <strong>in</strong><br />

Fig. 1.<br />

Fig. 1. The owchart <strong>in</strong> comb<strong>in</strong>ational <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong><br />

doma<strong>in</strong>s.<br />

Algorithm:<br />

1. Separate watermark<strong>in</strong>to two parts:<br />

W = {w(i; j); 0 6 i; j ¡ M}, where w(i; j) ∈{0; 1},<br />

W 1 = {w 1 (i; j); 0 6 i; j ¡ M1}, where w 1 (i; j) ∈{0; 1},<br />

W 2 = {w 2 (i; j); 0 6 i; j ¡ M2}, where w 2 (i; j) ∈{0; 1},<br />

M = M1 + M2<br />

2. Insert W 1 <strong>in</strong>to <strong>the</strong> <strong>spatial</strong> doma<strong>in</strong> of H to obta<strong>in</strong> H S<br />

asH s ={h s (i; j)=h(i; j)⊕w 1 (i; j); 0 6 i; j ¡ N}, where<br />

h(i; j);h S (i; j) ∈{0; 1; 2;:::;2 L − 1} <strong>and</strong> L is <strong>the</strong> number<br />

of bits used as <strong>in</strong> <strong>the</strong> gray level of pixels.<br />

3. Transform H S by DCT to obta<strong>in</strong> H DCT .<br />

4. Insert W 2 <strong>in</strong>to <strong>the</strong> coe cients of H DCT to obta<strong>in</strong> H F as<br />

H F = {h F (i; j) =h DCT (i; j) ⊕ w 2 (i; j); 0 6 i; j ¡ N},<br />

where h F (i; j) ∈{0; 1; 2;:::;2 L − 1}.<br />

5. Transform <strong>the</strong> embedded host <strong>image</strong> by Inverse DCT.<br />

The criteria of splitt<strong>in</strong>g <strong>the</strong> watermark<strong>image</strong> <strong>in</strong>to two<br />

parts, which are <strong>in</strong>dividually <strong>in</strong>serted <strong>in</strong>to <strong>the</strong> <strong>in</strong>put <strong>image</strong><br />

<strong>in</strong> <strong>the</strong> <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong> doma<strong>in</strong>s, depend on users <strong>and</strong><br />

applications. In pr<strong>in</strong>ciple, <strong>the</strong> most important data exist <strong>in</strong><br />

<strong>the</strong> center of <strong>the</strong> <strong>image</strong>. Therefore, a simply way of splitt<strong>in</strong>g<br />

is to select <strong>the</strong> central w<strong>in</strong>dow <strong>in</strong> <strong>the</strong> watermark<strong>image</strong><br />

to be <strong>in</strong>serted <strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>. With <strong>the</strong> user’s<br />

preference, we can crop <strong>the</strong> most private data to be <strong>in</strong>serted<br />

<strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>.<br />

3. The <strong>watermark<strong>in</strong>g</strong> <strong>in</strong> <strong>the</strong> <strong>spatial</strong> doma<strong>in</strong><br />

There are many ways of embedd<strong>in</strong>g a watermark<strong>in</strong>to <strong>the</strong><br />

<strong>spatial</strong> doma<strong>in</strong> of a host <strong>image</strong>, for example, substitut<strong>in</strong>g <strong>the</strong><br />

less signi cant bits of some pixels [10], chang<strong>in</strong>g <strong>the</strong> paired<br />

pixels [11], <strong>and</strong> cod<strong>in</strong>g by textured blocks [12]. As shown <strong>in</strong><br />

Fig. 2, <strong>the</strong> <strong>watermark<strong>in</strong>g</strong> can be implemented by modify<strong>in</strong>g<br />

<strong>the</strong> bits of some pixels <strong>in</strong> <strong>the</strong> host <strong>image</strong>. Let H ∗ be <strong>the</strong><br />

watermarked host <strong>image</strong>. The algorithm is shown below.<br />

Algorithm:<br />

1. Obta<strong>in</strong> pixels from <strong>the</strong> host <strong>image</strong>.<br />

H = {h(i; j); 06i; j¡N }; h(i; j)∈{0; 1; 2;:::;2 L − 1}:<br />

2. Obta<strong>in</strong> pixels from <strong>the</strong> watermark.<br />

W = {w(i; j); 0 6 i; j ¡ M}:<br />

Fig. 2. The owchart <strong>in</strong> <strong>spatial</strong> doma<strong>in</strong>s.


3. Substitute <strong>the</strong> pixels of <strong>the</strong> watermark<strong>in</strong>to <strong>the</strong> LSB pixels<br />

of <strong>the</strong> host <strong>image</strong>.<br />

H ∗ = {h ∗ (i; j)=h(i; j) ⊕ w(i; j); 0 6 i; j ¡ N };<br />

h ∗ (i; j) ∈{0; 1; 2;:::;2 L − 1}:<br />

4. The <strong>watermark<strong>in</strong>g</strong> <strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong><br />

Several approaches can be used <strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>,<br />

for example, JPEG-based [13], spread spectrum [2,14], <strong>and</strong><br />

content-based approaches [6]. How can we embed data <strong>in</strong>to<br />

<strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> of a host <strong>image</strong> <strong>and</strong> it appears unperceivable?<br />

The transformation functions often-used are DCT,<br />

DWT, <strong>and</strong> DFT. Generally, we can <strong>in</strong>sert data <strong>in</strong>to <strong>the</strong> coe<br />

cients of a transformed <strong>image</strong>.<br />

As shown <strong>in</strong> Figs. 3 <strong>and</strong> 4, we embed watermark<strong>in</strong>to <strong>the</strong><br />

coe cients of a transformed host <strong>image</strong>. The important consideration<br />

is what locations are best to place for embedd<strong>in</strong>g<br />

watermark<strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> to avoid distortion [15].<br />

Let H m <strong>and</strong> W n be <strong>the</strong> subdivided <strong>image</strong>s from H <strong>and</strong> W ,<br />

respectively, H m DCT be <strong>the</strong> <strong>image</strong> transformed from H m by<br />

DCT, <strong>and</strong> H m F be <strong>the</strong> <strong>image</strong> comb<strong>in</strong>ed by H m DCT <strong>and</strong> W n<br />

<strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>.<br />

The algorithm is described as follows.<br />

Algorithm:<br />

1. Divide <strong>the</strong> host <strong>image</strong> <strong>in</strong>to sets of 8 × 8 blocks.<br />

H = {h(i; j); 0 6 i; j ¡ N },<br />

H m = {h m (i; j); 0 6 i; j ¡ 8}, where h m (i; j) ∈{0; 1;<br />

2;:::;2 L − 1} <strong>and</strong> m is <strong>the</strong> total number of <strong>the</strong> 8 × 8<br />

blocks.<br />

2. Divide <strong>the</strong> watermark<strong>image</strong> <strong>in</strong>to sets of 2 × 2 blocks.<br />

W = {w(i; j); 0 6 i; j ¡ M},<br />

W n ={w n (i; j); 0 6 i; j ¡ 2}, where w n (i; j) ∈{0; 1} <strong>and</strong><br />

n is <strong>the</strong> total number of <strong>the</strong> 2 × 2 blocks.<br />

3. Transform H m to H m DCT by DCT.<br />

4. Insert W m <strong>in</strong>to <strong>the</strong> coe cients of H m DCT .<br />

H m F ={h m F (i; j)=h m DCT (i; j)⊕w m (i; j); 06i; j¡8};<br />

h m DCT (i; j) ∈{0; 1; 2;:::;2 L − 1}:<br />

5. Transform <strong>the</strong> embedded host <strong>image</strong>, H m F , by Inverse<br />

DCT.<br />

The criterion for embedd<strong>in</strong>g <strong>the</strong> watermark<strong>image</strong> <strong>in</strong>to <strong>the</strong><br />

<strong>frequency</strong> doma<strong>in</strong> of a host <strong>image</strong> is that <strong>the</strong> total number<br />

of 8×8 blocks must be larger than <strong>the</strong> total number of 2×2<br />

blocks.<br />

5. Experimental results<br />

Fig. 5 illustrates that some parts of a watermarkare important<br />

to be split for security purpose. For example, people<br />

F.Y. Shih, S.Y.T. Wu / Pattern Recognition 36 (2003) 969 – 975 971<br />

Fig. 3. The owchart <strong>in</strong> <strong>frequency</strong> doma<strong>in</strong>s.<br />

Fig. 4. The embedd<strong>in</strong>g skill <strong>in</strong> <strong>frequency</strong> doma<strong>in</strong>.<br />

cannot view whom <strong>the</strong> writer is <strong>in</strong> <strong>the</strong> <strong>image</strong>s. Therefore, it<br />

is embedded <strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> <strong>and</strong> <strong>the</strong> rest <strong>in</strong>to <strong>the</strong><br />

<strong>spatial</strong> doma<strong>in</strong>. In this way, we not only enlarge <strong>the</strong> capacity,<br />

but also secure <strong>the</strong> <strong>in</strong>formation that we are concerned<br />

with.<br />

Fig. 6 shows <strong>the</strong> orig<strong>in</strong>al Lena picture with size 256×256.<br />

Fig. 7 is <strong>the</strong> traditional technique of embedd<strong>in</strong>g a 64 ×<br />

64 watermark<strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> of a host <strong>image</strong>.<br />

Fig. 7(a) is <strong>the</strong> orig<strong>in</strong>al 64 × 64 watermark<strong>image</strong> <strong>and</strong><br />

Fig. 7(b) is <strong>the</strong> watermarked Lena <strong>image</strong> by embedd<strong>in</strong>g Fig.<br />

7(a) <strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> of Fig. 6. Fig. 7(c) is <strong>the</strong><br />

extracted watermark<strong>image</strong> from Fig. 7(b).<br />

Fig. 8 demonstrates <strong>the</strong> embedd<strong>in</strong>g of a large watermark,<br />

a 128×128 <strong>image</strong>, <strong>in</strong>to a host <strong>image</strong>. Fig. 8(a) is <strong>the</strong> orig<strong>in</strong>al<br />

128 × 128 watermark<strong>image</strong>. Fig. 8(b) <strong>and</strong> (c) are <strong>the</strong> two<br />

divided <strong>image</strong>s from <strong>the</strong> orig<strong>in</strong>al watermark, respectively.<br />

We obta<strong>in</strong> Fig. 8(e) by embedd<strong>in</strong>g Fig. 8(b) <strong>in</strong>to <strong>the</strong> <strong>spatial</strong><br />

doma<strong>in</strong> of Lena <strong>image</strong> <strong>and</strong> obta<strong>in</strong> Fig. 8(f) by embedd<strong>in</strong>g<br />

Fig. 8(c) <strong>in</strong>to <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong> of <strong>the</strong> watermarked<br />

Lena <strong>image</strong> <strong>in</strong> Fig. 8(e). Fig. 8(d) is <strong>the</strong> extracted watermark<br />

from Fig. 8(f).<br />

Fig. 9(a) shows a larger watermark, a 256 × 256 <strong>image</strong>,<br />

which is split <strong>in</strong>to two parts as <strong>in</strong> Fig. 5. Fig. 9(c)<br />

<strong>and</strong> (d) is <strong>the</strong> watermarked <strong>image</strong>s after embedd<strong>in</strong>g watermark<strong>in</strong><br />

<strong>the</strong> <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong> doma<strong>in</strong>s of a host <strong>image</strong>,<br />

respectively. Fig. 9(b) is <strong>the</strong> extracted watermarkfrom<br />

Fig. 9(d).<br />

The error measures used <strong>in</strong> this paper are normalized correlation<br />

(NC) <strong>and</strong> power signal-to-noise ratio (PSNR). They<br />

are de ned as follows, where <strong>the</strong> symbols are de ned <strong>in</strong> <strong>the</strong>


972 F.Y. Shih, S.Y.T. Wu / Pattern Recognition 36 (2003) 969 – 975<br />

previous sections:<br />

N N i=1<br />

N i=1<br />

Fig. 6. Lena <strong>image</strong>.<br />

j=1<br />

NC =<br />

H(i; j)H F (i; j)<br />

N ;<br />

j=1 [H(i; j)]2<br />

N N i=1 j=1<br />

PSNR = 10 log10 [h∗ (i; j)] 2<br />

N N i=1 j=1 [h(i; j) − h∗ (i; j)] 2<br />

<br />

:<br />

Table 1 presents <strong>the</strong> results of embedd<strong>in</strong>g di erent sizes<br />

of watermark<strong>in</strong>to a host <strong>image</strong>. PSNR <strong>in</strong> <strong>the</strong> rst step means<br />

compar<strong>in</strong>g both <strong>the</strong> orig<strong>in</strong>al <strong>and</strong> <strong>the</strong> embedded Lena <strong>image</strong>s<br />

<strong>in</strong> <strong>the</strong> <strong>spatial</strong> doma<strong>in</strong>. PSNR <strong>in</strong> <strong>the</strong> second step means compar<strong>in</strong>g<br />

both <strong>image</strong>s <strong>in</strong> <strong>the</strong> <strong>frequency</strong> doma<strong>in</strong>. NC means <strong>the</strong><br />

normalized correlation by compar<strong>in</strong>g both <strong>the</strong> orig<strong>in</strong>al <strong>and</strong><br />

<strong>the</strong> extracted watermarks.<br />

Fig. 5. A 64 × 64 <strong>image</strong> is cut from a 256 × 256 <strong>image</strong>.<br />

Fig. 7. The traditional technique embedd<strong>in</strong>g a 64 × 64 watermark<br />

<strong>in</strong>to Lena <strong>image</strong>.<br />

6. Fur<strong>the</strong>r encryption of comb<strong>in</strong>ational <strong>watermark<strong>in</strong>g</strong><br />

For <strong>the</strong> purpose of enhanc<strong>in</strong>g robustness, a r<strong>and</strong>om permutation<br />

of <strong>the</strong> watermarkis used to defeat <strong>the</strong> attacks of<br />

signal process<strong>in</strong>g, such as <strong>image</strong> crops. The procedures are<br />

shown <strong>in</strong> Fig. 10.<br />

A r<strong>and</strong>om sequence generator is used <strong>in</strong> order to relocate<br />

<strong>the</strong> order of sequential numbers [5]. For example, <strong>the</strong> 12-bit<br />

r<strong>and</strong>om sequence generator is used to relocate <strong>the</strong> order of<br />

a watermarkwith size 64 × 64, as shown <strong>in</strong> Fig. 11. We<br />

rearrange <strong>the</strong> bits 9 <strong>and</strong> 6 to <strong>the</strong> rear of <strong>the</strong> whole sequence<br />

<strong>and</strong> <strong>the</strong> result is shown <strong>in</strong> Fig. 11(b).<br />

Fig. 12 shows <strong>the</strong> result when a half of <strong>the</strong> Lena <strong>image</strong><br />

is cropped. Fig. 12(a) is <strong>the</strong> orig<strong>in</strong>al 128 × 128 watermark,<br />

Fig. 12(b) is <strong>the</strong> cropped Lena <strong>image</strong>, <strong>and</strong> Fig. 12(c) is <strong>the</strong><br />

extracted watermark.


F.Y. Shih, S.Y.T. Wu / Pattern Recognition 36 (2003) 969 – 975 973<br />

Fig. 8. The results when embedd<strong>in</strong>g a 128 × 128 watermark<strong>in</strong>to Lena <strong>image</strong>.<br />

Fig. 9. The results when embedd<strong>in</strong>g a 256 × 256 watermark<strong>in</strong>to Lena <strong>image</strong>.


974 F.Y. Shih, S.Y.T. Wu / Pattern Recognition 36 (2003) 969 – 975<br />

Table 1<br />

The comparisons when embedd<strong>in</strong>g di erent sized watermarks <strong>in</strong>to<br />

a Lena <strong>image</strong> with size 256 × 256<br />

Fig. 10. The procedures of r<strong>and</strong>omly permut<strong>in</strong>g <strong>the</strong> watermark.<br />

64 × 64 128 × 128 256 × 256<br />

PSNR <strong>in</strong> rst step None 56.58 51.14<br />

PSNR <strong>in</strong> second step 64.57 55.93 50.98<br />

NC 1 0.9813 0.9644<br />

Fig. 11. A 12-bit r<strong>and</strong>om sequence generator.<br />

Table 2 shows <strong>the</strong> results when parts of an embedded<br />

host <strong>image</strong> with a watermarkof 128 × 128 are cropped. For<br />

example, if <strong>the</strong> size of 64 × 64 is cropped from a 256 ×<br />

256 embedded host <strong>image</strong>, <strong>the</strong> NC is 0.92. If a half of <strong>the</strong><br />

embedded host <strong>image</strong> is cropped (i.e., eight of 64 × 64) as<br />

shown <strong>in</strong> Fig. 12(b), <strong>the</strong> NC is 0.52.<br />

7. Conclusions<br />

In this paper, we have presented <strong>the</strong> progression of embedd<strong>in</strong>g<br />

a large watermark<strong>in</strong>to a host <strong>image</strong>. The technique<br />

is based on both <strong>spatial</strong> <strong>and</strong> <strong>frequency</strong> doma<strong>in</strong>s. In <strong>the</strong><br />

Fig. 12. The results when cropp<strong>in</strong>g half of a Lena <strong>image</strong>.<br />

Table 2<br />

The comparisons when cutt<strong>in</strong>g di erent sizes of a Lena <strong>image</strong><br />

Times of 1 2 3 4 5 6 7 8<br />

64 × 64<br />

NC 0.92 0.88 0.81 0.73 0.68 0.61 0.58 0.52<br />

<strong>spatial</strong> doma<strong>in</strong>, we ma<strong>in</strong>ly substitute <strong>the</strong> LSB bits <strong>in</strong> a host<br />

<strong>image</strong> with <strong>the</strong> bits <strong>in</strong> <strong>the</strong> watermark<strong>image</strong>. In <strong>the</strong> <strong>frequency</strong><br />

doma<strong>in</strong>, we <strong>in</strong>sert data <strong>in</strong>to <strong>the</strong> low <strong>frequency</strong> of a host<br />

<strong>image</strong>. Simulation results demonstrate <strong>the</strong> embedd<strong>in</strong>g a large<br />

watermark<strong>in</strong>to a host <strong>image</strong>.


Mostly, <strong>the</strong> important part of an <strong>image</strong> is not enormous.<br />

We can cut <strong>the</strong> important part <strong>and</strong> embed it <strong>in</strong>to <strong>the</strong> <strong>frequency</strong><br />

doma<strong>in</strong> <strong>and</strong> <strong>the</strong> rest <strong>in</strong>to <strong>the</strong> <strong>spatial</strong> doma<strong>in</strong> of a host<br />

<strong>image</strong>. Therefore, we cannot only enlarge <strong>the</strong> size of watermark,<br />

but also rema<strong>in</strong> <strong>the</strong> property of security <strong>and</strong> imperceptibility.<br />

The proposed comb<strong>in</strong>ational <strong>image</strong> <strong>watermark<strong>in</strong>g</strong><br />

possesses <strong>the</strong> follow<strong>in</strong>g advantages. More watermarkdata<br />

can be <strong>in</strong>serted <strong>in</strong>to <strong>the</strong> host <strong>image</strong>, so that <strong>the</strong> capacity is <strong>in</strong>creased.<br />

The splitt<strong>in</strong>g of <strong>the</strong> watermark<strong>in</strong>to two parts makes<br />

<strong>the</strong> degree of protection double. The splitt<strong>in</strong>g strategy can be<br />

designed even more complicated to be unable to compose.<br />

References<br />

[1] H. Berghel, L. O’Gorman, Protect<strong>in</strong>g ownership rights through<br />

digital <strong>watermark<strong>in</strong>g</strong>, IEEE Comput. Mag. 29 (7) (1996)<br />

101–103.<br />

[2] I. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure<br />

spread spectrum <strong>watermark<strong>in</strong>g</strong> for <strong>image</strong>s audio <strong>and</strong> video,<br />

Proceed<strong>in</strong>gs of <strong>the</strong> 1996 IEEE International Conference on<br />

Image Process<strong>in</strong>g (ICIP’96), Lausanne, Switzerl<strong>and</strong>, Vol. III,<br />

pp. 243–246.<br />

[3] N. Nikolaidis, I. Pitas, Robust <strong>image</strong> <strong>watermark<strong>in</strong>g</strong> <strong>in</strong> <strong>the</strong><br />

<strong>spatial</strong> doma<strong>in</strong>, Signal Process. 66 (3) (1998) 385–403.<br />

[4] Jiwu Huang, Yun Q. Shi, Yi Shi, Embedd<strong>in</strong>g <strong>image</strong><br />

watermarks <strong>in</strong> DC components, IEEE Trans. CSVT 10 (6)<br />

(2000) 974–979.<br />

[5] Sh<strong>in</strong>feng D. L<strong>in</strong>, Ch<strong>in</strong>-Feng Chen, A robust DCT-based<br />

<strong>watermark<strong>in</strong>g</strong> for copyright protection, IEEE Trans. Consumer<br />

Electron. 46 (3) (2000) 415–421.<br />

F.Y. Shih, S.Y.T. Wu / Pattern Recognition 36 (2003) 969 – 975 975<br />

[6] P. Bas, J.-M. Chassery, B. Macq, Image <strong>watermark<strong>in</strong>g</strong>: an<br />

evolution to content based approaches Pattern Recognition 35<br />

(2002) 545–561.<br />

[7] M. Barni, F. Bartol<strong>in</strong>i, A. De Rosa, A. Piva, Capacity of <strong>the</strong><br />

watermarkchannel: how many bits can be hidden with<strong>in</strong> a<br />

digital <strong>image</strong>? Proc. SPIE 3657 (1999) 437–448.<br />

[8] P. Moul<strong>in</strong>, M.K. Mihcak, The data-hid<strong>in</strong>g capacity of <strong>image</strong><br />

sources, IEEE Trans. Image Process. (2002), <strong>in</strong> press.<br />

[9] O. Bruyndonckx, J.-J. Quisquater, B. Macq, Spatial method<br />

for copyright label<strong>in</strong>g of digital <strong>image</strong>s, Proceed<strong>in</strong>g of IEEE<br />

Workshop on Nonl<strong>in</strong>ear Signal <strong>and</strong> Image process<strong>in</strong>g, Neos<br />

Marmaras, Greece, 20–22 June 1995, pp. 456–459.<br />

[10] R. Wolfgang, E. Delp, A <strong>watermark<strong>in</strong>g</strong> technique for digital<br />

<strong>image</strong>ry: fur<strong>the</strong>r studies, International Conference on Imag<strong>in</strong>g<br />

Science, Systems <strong>and</strong> Technology, Los Vegas, Nevada, Juillet<br />

1997.<br />

[11] I. Pitas, T. Kaskalis, Apply<strong>in</strong>g signatures on digital <strong>image</strong>s,<br />

Workshop on Nonl<strong>in</strong>ear Signal <strong>and</strong> Image Process<strong>in</strong>g, IEEE,<br />

Neos Marmaras, June 1995, pp. 460–463.<br />

[12] G. Caronni, Assur<strong>in</strong>g ownership rights for digital <strong>image</strong>s,<br />

Proceed<strong>in</strong>gs of Reliable IT Systems, VIS’95, Viewveg<br />

Publish<strong>in</strong>g Company, Germany, 1995.<br />

[13] K.E. Zhao J., Embedd<strong>in</strong>g robust labels <strong>in</strong>to <strong>image</strong>s for<br />

copyright protection, Technical Report, Fraunhofer Institute<br />

for Computer Graphics, Darmatadt, Germany, 1994.<br />

[14] I. Cox, J. Killian, T. Leighton, T. Shamoon, Secure spread<br />

spectrum <strong>watermark<strong>in</strong>g</strong> for multimedia, IEEE Trans. Image<br />

Process. 6 (12) (1997) 1673–1687.<br />

[15] C.-T. Hsu, J.-L. Wu, Hidden signature <strong>in</strong> <strong>image</strong>s, IEEE Trans.<br />

Image Process. 8 (1999) 58–68.<br />

About <strong>the</strong> Author—FRANK Y. SHIH received <strong>the</strong> B.S. degree from National Cheng-Kung University, Taiwan, <strong>in</strong> 1980, <strong>the</strong> M.S. degree<br />

from <strong>the</strong> State University of New Yorkat Stony Brook, <strong>in</strong> 1984, <strong>and</strong> <strong>the</strong> Ph.D. degree from Purdue University, West Lafayette, Indiana,<br />

<strong>in</strong> 1987, all <strong>in</strong> Electrical Eng<strong>in</strong>eer<strong>in</strong>g. He is presently a professor jo<strong>in</strong>tly appo<strong>in</strong>ted <strong>in</strong> <strong>the</strong> Department of Computer Science (CS) nad <strong>the</strong><br />

Department of Electrical <strong>and</strong> Computer Eng<strong>in</strong>eer<strong>in</strong>g (ECE) at New Jersey Institute of Technology, Newark, NJ. He currently serves as <strong>the</strong><br />

Associate Chair of <strong>the</strong> CS Department <strong>and</strong> <strong>the</strong> Director of Computer Vision Laboratory.<br />

Dr. Sh<strong>in</strong> is on <strong>the</strong> Editorial Board of <strong>the</strong> International Journal of Systems Integration. He is also an associate editor of <strong>the</strong> International<br />

Journal of Information Sciences, <strong>and</strong> of <strong>the</strong> International Journal of Pattern Recognition. He has served as a member of several organiz<strong>in</strong>g<br />

committees for technical conferences <strong>and</strong> workshops. He was <strong>the</strong> recipient of <strong>the</strong> Research Initiation Award from <strong>the</strong> National Science<br />

Foundation <strong>in</strong> 1991. He was <strong>the</strong> recipient of <strong>the</strong> W<strong>in</strong>ner of <strong>the</strong> International Pattern Recognition Society Award for Outst<strong>and</strong><strong>in</strong>g Paper<br />

Contribution. He has received several awards for dist<strong>in</strong>guished research at New Jersey Institute of Technology.He has served several times<br />

<strong>in</strong> <strong>the</strong> Proposal Review Panel of <strong>the</strong> National Science Foundation on Computer Vision <strong>and</strong> Mach<strong>in</strong>e Intelligence.<br />

He holds <strong>the</strong> IEEE senior membership. Dr. Shih has published over 110 technical papers <strong>in</strong> well-known prestigious journals <strong>and</strong> conferences.<br />

His current research <strong>in</strong>terests <strong>in</strong>clude <strong>image</strong> process<strong>in</strong>g, computer vision, computer graphics, arti cial <strong>in</strong>telligence, expert systems, robotics,<br />

computer architecture, fuzzy logic, <strong>and</strong> neural networks.<br />

About <strong>the</strong> Author—YI-TA WU was born <strong>in</strong> Taipei, Taiwan, on March 22 1971. He received <strong>the</strong> B.S. degree <strong>in</strong> Physics from Tamkang<br />

University, Taipei, Taiwan, <strong>in</strong> 1995, <strong>and</strong> <strong>the</strong> M.S. degree <strong>in</strong> Computer Science from National Dong-Hwa University, Hualien, Taiwan, <strong>in</strong><br />

1997. He is current a Ph.D. student <strong>in</strong> <strong>the</strong> Computer Science Department, New Jersey Institute of Technology, Newark, NJ. His research<br />

<strong>in</strong>terest <strong>in</strong>clude <strong>image</strong> process<strong>in</strong>g, current vision, pattern recognition, <strong>and</strong> database.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!