dct-domain watermarking chiou-ting hsu and ja-ling wu, "hidden digital watermarks in...

14
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital wate rmarks in images," IEEE Trans. On Image Processing, vo l. 8, No. 1, January 1999 Multimedia Security

Upload: justina-norris

Post on 13-Jan-2016

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

DCT-Domain Watermarking

Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in image

s," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

Multimedia Security

Page 2: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

2

A generic image watermarking system

• Requirements– Invisibility– Robustness – No ambiguity

Watermark

EmbeddingDistortions•Image processing•Compression•…...

ExtractionWatermark

Comparison

Page 3: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

3

Advantages of this scheme

• Advantages:– Semantically meaningful watermark pattern– Good perceptual invisibility– Acceptable robustness– Various user-selected options– Reasonable complexity/execution time

Page 4: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

4

System overview

• Watermarks are randomly permuted to spread their spatial relationship, and then embedded in the DCT domain of the host image, with consideration of invisibility/robustness

Page 5: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

5

Block Diagrams of the Original Algorithm

Original Image

FDCT

Embedding(Polarity Reversing)

IDCT

Watermark Image

Pseudo-random Permutation

Block-based Mapping

Watermarked Image

Page 6: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

6

Block Diagrams of the Original Algorithm

Original Image

FDCT

Suspected Image

FDCT

Extract the Permutated Data (XOR)

Reverse Block-based Permutation

Reverse Pseudo-random Permutation

Extracted Watermark

Page 7: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

7

Block DCT/IDCT

• Advantages– Fast – Suitable for robustness against JPEG

compression

• Disadvantages– Block effect– Effect of picture cropping

Page 8: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

8

Semantic Meaningful Watermarks

• Watermarks can be verified with naked eyes by understanding the semantics of the extracted watermark patterns

The seal of CML (in Chinese characters)

Page 9: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

9

Pseudo-Random Permutation

• A n-bit Linear Feedback Shift Register (LFSR) is used to generate the maximal length (2n-1) sequence

+

The 14-bit Shift Register thatpermutes 1-16384

Original Watermark

Permuted Watermark

Page 10: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

10

Block-based Mapping

• Watermark blocks with more signal pixels are embedded into image blocks with higher variances– to achieve better perceptual invisibility.

Page 11: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

11

Embedding(1/2)

• Choices of embedding positions within each block:

– Low-frequency• Bad invisibility

– High-frequency• Bad robustness

=> Middle-frequency• Fix positions in each block

0 1 5 6 14 15 27 282 4 7 13 16 26 29 423 8 12 17 25 30 41 439 11 18 24 31 40 44 5310 19 23 32 39 45 52 5420 22 33 38 46 51 55 6021 34 37 47 50 56 59 6135 36 48 49 57 58 62 63

Embedding 4 watermark pixels

Page 12: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

12

Embedding(2/2)

• Polarity: the inequality relations between the scaled DC value and the selected AC coefficients

otherwise

QQrScaleFacto

DCjiQ

jiQ

jiACif

jiP

,0

)0,0(*)0,0(*

),(*),(

),(,1

),(

• Effects of the JPEG quantization table are also considered

Page 13: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

13

Polarity Reversing

• Polarity: the inequality relationship between DC & corresponding AC values within each DCT block.

0 1 0 1 0 0 1

1 1 0 0 1 0 1

watermark bits:

polarity:

reversed polarity: 1 0 0 1 1 0 0XOR

Embedding Extraction

Page 14: DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999

14

Extraction

• Exclusive-or (XOR) operations are performed on the two polarity patterns to obtain the permuted binary data.