project report on digital watermarking

41
A PROJECT REPORT On To study and implement Digital Watermarking algorithm on Images using Scale Invariant Feature Transformation submitted for partial fulfillment for the degree of Bachelor of Technology In Department of Computer Engineering (2009-10) Supervisor: Dr. Vijay Laxmi Pritam Hinger (0609449) Vikas Sarda (0609463) Vishal Pareek (0609469) MALAVIYA NATIONAL INSTITUTE of TECHNOLOGY

Upload: pritamhinger

Post on 09-Apr-2015

5.651 views

Category:

Documents


17 download

TRANSCRIPT

Page 1: Project Report on Digital Watermarking

A PROJECT REPORT

On

To study and implement Digital Watermarking

algorithm on Images using Scale Invariant Feature

Transformation

submitted for partial fulfillment for the degree of

Bachelor of Technology

In

Department of Computer Engineering

(2009-10)

Supervisor: Dr. Vijay Laxmi Pritam Hinger (0609449)

Vikas Sarda (0609463)

Vishal Pareek (0609469)

MALAVIYA NATIONAL INSTITUTE of TECHNOLOGY

Page 2: Project Report on Digital Watermarking

MALAVIYA NATIONAL INSTITUTE of TECHNOLOGY

(Deemed University)

JAIPUR(RAJASTHAN)-302017

DEPARTMENT of COMPUTER ENGINEERING

CERTIFICATE

This is to certify that project report entitled “Study and implement Digital Watermarking

algorithm on Images using Scale Invariant Feature Transformation” is submitted by

Pritam Hinger (0609449)

Vikas Sarda (0609463)

Vishal Pareek (0609469)

In partial fulfillment for the degree of bachelor of technology in computer engineering

department is hereby approved for submission.

Dr. Vijay Laxmi

Professor,

Department of Computer Engineering MNIT, Jaipur

Page 3: Project Report on Digital Watermarking

Contents

Chapter 1 INTRODUCTION ......................................................................................................... 6

Chapter 2 Overview ................................................................................................................ 8

2.1 History of Watermarking .................................................................................................................. 10

2.2 Requirements for watermarking algorithms: .................................................................................... 11

2.3 Importance of Digital Watermarking ................................................................................................ 12

2.4 Applications of Digital Watermarking .............................................................................................. 14

2.5 Attacks on Watermarked Work ........................................................................................................ 17

2.5.1 Scrambling Attacks: ..................................................................................................... 17

2.5.2 Pathological Distortions: .............................................................................................. 17

2.5.3 Copy Attacks: ............................................................................................................... 18

2.5.4 Ambiguity Attacks:....................................................................................................... 18

Chapter 3 Methodology ................................................................................................................. 19

3.1 Project Flow ...................................................................................................................................... 19

3.1.1 Insertion of Watermark Image into Cover Work: - ...................................................... 19

3.1.2 Extraction of Watermark Image from Watermarked Image: - ..................................... 19

3.1.3 Calculation of Detection ratio: - ................................................................................... 20

3.2 Step By Step procedure ..................................................................................................................... 20

3.2.1 Read Cover Image: ....................................................................................................... 20

3.2.2 SIFT: ............................................................................................................................. 20

3.2.3 Watermark Generation: ................................................................................................ 27

3.2.4 Watermark Insertion: .................................................................................................... 29

3.2.5 Watermark Detection:................................................................................................... 31

3.2.6 Detection ratio: ............................................................................................................. 33

Chapter 4 RESULTS ....................................................................................................................... 34

4.1 Test Images: ...................................................................................................................................... 34

4.1.1 Cover work: .................................................................................................................. 34

4.1.2 Position of Invariant patches in cover work: ................................................................ 34

4.1.3 Watermark image: ........................................................................................................ 35

Page 4: Project Report on Digital Watermarking

4.1.4 Cover Image with watermark: ...................................................................................... 35

4.1.5 Retrieved Watermark: ................................................................................................... 35

4.2 Performance of watermarking scheme and test results: .................................................................... 36

Chapter 5 Conclusion and Future Work .................................................................................... 37

Appendix A .................................................................................................................................................. 38

References .................................................................................................................................................. 40

Page 5: Project Report on Digital Watermarking

ACKNOWLEDGEMENT

We are deeply indebted to our guide Dr. Vijay Laxmi, professor in the department of computer

engineering, MNIT Jaipur for their incomparable encouragement and valuable support in the

project.

We owe our deep regard to Dr. M. S. Gaur, professor in the department of computer

engineering, MNIT Jaipur, whose noble suggestion and guidance as our project coordinator was

instrumental in completing the project.

We would like to acknowledge our sincere regards to all faculty members of department of

Computer Engineering, MNIT and especially to Mrs. Reena Gunjan for her help and valuable

suggestions in the project.

We would like to thank our friend and classmate Roopesh Chuggani for his direct and indirect

help in the project.

Pritam Hinger

Vikas Sarda

Vishal Pareek

Date: - 10th

May, 2010

Place: - MNIT, Jaipur

Page 6: Project Report on Digital Watermarking

ABSTRACT

With the advent of internet, creation and delivery of digital data (images, video and audio files,

digital repositories and libraries, web publishing) has grown many fold. With this, issues like,

protection of rights of the content and proving ownership, arises. Digital watermarking came as a

technique and a tool to overcome shortcomings of current copyright laws for digital data. To

prove ownership and protect right, a watermark is embedded in data but to save watermark from

counterfeiters we need to find locations which are invariant to all kind of attacks (rotation,

expansion, compression, cropping, filtering, and blurring). Every image has regions, also known

as patches, which are invariant to attacks. These patches can be found by using Scale Invariant

Feature Transform (SIFT) over image. As these patches are very stable and resistant to attacks so

watermark is inserted in these patches and can also be successfully extracted with low error

probability.

Page 7: Project Report on Digital Watermarking

Chapter 1 INTRODUCTION

We are living in the era of information where billions of bits of data is created in every fraction

of a second and with the advent of internet, creation and delivery of digital data (images, video

and audio files, digital repositories and libraries, web publishing) has grown many fold. Since

copying a digital data is very easy and fast too so, issues like, protection of rights of the content

and proving ownership, arises. Digital watermarking came as a technique and a tool to overcome

shortcomings of current copyright laws for digital data. The specialty of watermark is that it

remains intact to the cover work even if it is copied. So to prove ownership or copyrights of data

watermark is extracted and tested. It is very difficult for counterfeiters to remove or alter

watermark. As such the real owner can always have his data safe and secure.

Our aim was to study different watermarking techniques and implement the one which is

most resistant to all types of attack, scalar or geometric. Counterfeiters try to degrade the quality

of watermarked image by attacking an image (generally attacks are median and Gaussian filter,

scaling, compression and rotation of watermarked image).By attacking watermarked image it

become very difficult to recover watermark back from the watermarked image and even if it

extracted one may no longer use it to prove the ownership and copyrights. So our main idea was

to find such regions, also known as patches, in an image which are very stable and resistant to

attacks.

The report is divided mainly in 4 chapters coving literature on watermarking (chapter2), our

methodology and step by step procedure (chapter3), test images and results (chapter4),

conclusion and future work (chapter5).

Chapter 2 gives full insight of digital watermarking, its history, requirements, application

and possible attacks. The first subheading tells how, with information revolution, the need to

have some technique to prevent piracy and illegal copying of data arises. This need give rise to a

new technique, known as Digital Watermarking. While proposing any algorithm some

parameters are needed to keep in mind on which the proposed algorithm must be consistent.

These parameters are discussed in following section. Following sections are dedicated to

watermarking application and attacks. A lot of work is going on for making watermarking

techniques immune towards attack to retain the originality of watermark and assuring successful

Page 8: Project Report on Digital Watermarking

extraction of watermark with low error probabilities so to sort out disputes, if any, over

copyrights or ownership.

Chapter 3 starts with a flowchart showcasing the complete flow of project. Flowchart also

contains names of all the functions written to implement the proposed method. The next few

sections explain the complete process followed by us in full detail, listing all the mathematical

steps and explaining all the concepts used, like SIFT.

Chapter 4 lists all the test images and test results. The proposed method is tested for over

30 random images (all 150x200 .jpeg images) covering over 7500 patches. Each image is

attacked (13 different types of attacks) and tested. Results are listed in next section.

Chapter 5 concludes the report with possible work which may be done in future. Since

threats like piracy and counterfeiting are increasing day by day so a lot more work and research

can be done.

Appendix A contains code snippets and all functions’ signature.

Page 9: Project Report on Digital Watermarking

Chapter 2 Overview

Hold a Rs100 note up or your offer letter up to light. What you will see is a picture of

Mahatma Gandhi or company’s logo respectively. This is what is known as a watermark mainly

used to prove the ownership (in case of offer letter, watermark prove that the document is official

document of company meant for official work) or authenticity (in case of Rs 100, watermark rule

out the forgery and authenticate the piece of paper of its worth).

The watermark on the Rs100 (Figure2.1), just like most paper watermarks today, has two

properties. First, the watermark is hidden from view during normal use, only becoming visible as

a result of a special viewing process (in this case, holding the bill up to the light). Second, the

watermark carries information about the object in which it is hidden (in this case, the watermark

indicates the authenticity of the bill).

Fig 2.1 Image showing an INR 100 note having watermark at its left side which is considerably visible

when note hold under light.

Watermark

Page 10: Project Report on Digital Watermarking

In addition to paper, watermarking can be applied to other physical objects and to electronic

signals. Fabrics, garment labels, and product packaging are examples of physical objects

that can be watermarked using special invisible dyes and inks Electronic representations of

music, photographs, and video are common types of signals that can be watermarked.

Thus, watermarking is defined as, “the practice of imperceptibly altering a Work to embed a

message about that Work.”

Fig 2.2 A Generic Watermarking System

As is clear from the figure, digital watermarking model consist of an embedder and a detector.

The embedder takes two inputs. One is the payload we want to embed (the watermark ),

and the other is the cover work in which we want to embed the payload. The output of the

embedder is typically transmitted or recorded. Later, that Work (or some other Work that

has not been through the embedder) is presented as an input to the detector. Most detectors try

to determine whether a payload is present, and if so, output the message encoded by it.

The watermarking model is analogous to a communication model in which sender encode a

message before transmitting it over communication channel and on receiving, receiver decode

the encoded message.

Page 11: Project Report on Digital Watermarking

2.1 History of Watermarking

Although the art of papermaking was invented in China over one thousand years

earlier, paper watermarks did not appear until about 1282, in Italy. The marks were made by

adding thin wire patterns to the paper molds. The paper would be slightly thinner where the wire

was and hence more transparent. The meaning and purpose of the earliest watermarks are

uncertain. They may have been used for practical functions such as identifying the molds

on which sheets of papers were made, or as trademarks to identify the paper maker. On

the other hand, they may have represented mystical signs, or might simply have served as

decoration. By the eighteenth century, watermarks on paper made in Europe and

America had become more clearly utilitarian. They were used as trademarks, to record the date

the paper was manufactured, and to indicate the sizes of original sheets. It was also

about this time that watermarks began to be used as anticounterfeiting measures on money

and other documents. The term watermark seems to have been coined near the

end of the eighteenth century and may have been derived from the German term wassermarke

(though it could also be that the German word is derived from the English). The term is actually

a misnomer, in that water is not especially important in the creation of the mark. It was probably

given because the marks resemble the effects of water on paper.

About the time the term watermark was coined, counterfeiters began developing methods

of forging watermarks used to protect paper money. Counterfeiting prompted advances in

watermarking technology. William Congreve, an Englishman, invented a technique for making

color watermarks by inserting dyed material into the middle of the paper during papermaking.

The resulting marks must have been extremely difficult to forge, because the Bank of

England itself declined to use them on the grounds that they were too difficult to make. A more

practical technology was invented by another Englishman, William Henry Smith. This replaced

the fine wire patterns used to make earlier marks with a sort of shallow relief sculpture,

pressed into the paper mold. The resulting variation on the surface of the mold produced

beautiful watermarks with varying shades of gray. This is the basic technique used today for the

face of President Jackson on the $20 bill.

Four hundred years later, in 1954, Emil Hembrooke of the Muzak Corporation filed a

patent for “watermarking” musical Works. An identification code was inserted in music by

Page 12: Project Report on Digital Watermarking

intermittently applying a narrow notch filter centered at 1 kHz. The absence of energy at this

frequency indicated that the notch filter had been applied and the duration of the absence used to

code either a dot or a dash. The identification signal used Morse code.

It is difficult to determine when digital watermarking was first discussed.

In 1979, Szepanski described a machine-detectable pattern that could be placed on documents for

anti-counterfeiting purposes. Nine years later, Holt described a method for embedding an

identification code in an audio signal. However, it was Komatsu and Tominaga, in 1988, which

appear to have first used the term digital watermark. Still, it was probably not until the early

1990s that the term digital watermarking really came into vogue. About 1995, interest in digital

watermarking began to mushroom. In addition, about this time, several organizations began

considering watermarking technology for inclusion in various standards. The Copy Protection

Technical Working Group (CPTWG) tested watermarking systems for protection of video on

DVD disks. The Secure Digital Music Initiative (SDMI) made watermarking a central

component of their system for protecting music. Two projects sponsored by the European Union,

VIVA [110] and Talisman, tested watermarking for broadcast monitoring. The International

Organization for Standardization (ISO) took an interest in the technology in the context of

designing advanced MPEG standards. In the late 1990s several companies were established to

market watermarking products. Technology from the Verance Corporation was adopted into the

first phase of SDMI and was used by Internet music distributors such as Liquid

Audio. In the area of image watermarking, Digimarc bundled its watermark

embedder and detectors with Adobe’s Photoshop. More recently, a number of companies have

used watermarking technologies for a variety of applications.

2.2 Requirements for watermarking algorithms:

A watermarking algorithm should be consistent over following properties and parameters:

Transparency: The most fundamental requirement for any Watermarking method shall be

such that it is transparent to the end user. The watermarked content should be consumable

at the intended user device without giving annoyance to the user. Watermark only shows

up at the watermark-detector device.

Page 13: Project Report on Digital Watermarking

Security: Watermark information shall only be accessible to the authorized parties. Only

authorized parties shall be able to alter the Watermark content. Encryption can be used to

prevent unauthorized access of the watermarked data

Ease of embedding and retrieval: Ideally, Watermarking on digital media should be

possible to be performed “on the fly”. The computation need for the selected algorithm

should be minimum.

Robustness: Watermarking must be robust enough to withstand all kinds for signal

processing operations, “attacks” or unauthorized access. Any attempt, whether intentional

or not, that has a potential to alter the data content is considered as an attack. Robustness

against attack is a key requirement for Watermarking and the success of this technology

for copyright protection depends on this.

Effect on bandwidth: Watermarking should be done in such a way that it doesn’t increase

the bandwidth required for transmission. If Watermarking becomes a burden for the

available bandwidth, the method will be rejected.

Interoperability: Digitally watermarked content shall still be interoperable so that it can

be seamlessly accessed through heterogeneous networks and can be played on various

playout devices that may be watermark aware or unaware.

2.3 Importance of Digital Watermarking

The sudden increase in watermarking interest is most likely due to the increase in concern

over copyright protection of content. The Internet had become user friendly with the introduction

of Marc Andreessen’s Mosaic web browser in November 1993, and it quickly became clear that

people wanted to download pictures, music, and videos. The Internet is an excellent distribution

system for digital media because it is inexpensive, eliminates warehousing and stock, and

delivery is almost instantaneous. However, content owners (especially large Hollywood studios

and music labels) also see a high risk of piracy. This risk of piracy is exacerbated by the

proliferation of high-capacity digital recording devices. When the only way the average

customer could record a song or a movie was on analog tape, pirated copies were

usually of a lower quality than the originals, and the quality of second-generation pirated

Page 14: Project Report on Digital Watermarking

copies (i.e., copies of a copy) was generally very poor. However, with digital recording devices,

songs and movies can be recorded with little, if any, degradation in quality. Using these

recording devices and using the Internet for distribution, would-be pirates can easily

record and distribute copyright-protected material without appropriate compensation being

paid to the actual copyright owners. Thus, content owners are eagerly seeking technologies that

promise to protect their rights. The first technology content owners turn to is cryptography.

Cryptography is probably the most common method of protecting digital content. It is certainly

one of the best developed as a science. The content is encrypted prior to delivery, and a

decryption key is provided only to those who have purchased legitimate copies of the

content. The encrypted file can then be made available via the Internet, but would be useless to a

pirate without an appropriate key. Unfortunately, encryption cannot help the seller monitor how

a legitimate customer handles the content after decryption. A pirate can actually purchase the

product, use the decryption key to obtain an unprotected copy of the content, and then

proceed to distribute illegal copies. In other words, cryptography can protect content in

transit, but once decrypted, the content has no further protection. Thus, there is a strong need

for an alternative or complement to cryptography: a technology that can protect content even

after it is decrypted. Watermarking has the potential to fulfill this need because it places

information within the content where it is never removed during normal usage. Decryption,

reencryption, compression, digital-to-analog conversion, and file format changes—a watermark

can be designed to survive all of these processes. Watermarking has been considered for many

copy prevention and copyright protection applications. In copy prevention, the watermark may

be used to inform software or hardware devices that copying should be restricted. In

copyright protection applications, the watermark may be used to identify the copyright

holder and ensure proper payment of royalties.

Although copy prevention and copyright protection have been major driving forces

behind research in the watermarking field, there is a number of other applications for which

watermarking has been used or suggested. These include broadcast monitoring, transaction

tracking, authentication (with direct analogy to our Rs100 example), copy control, and device

control.

Page 15: Project Report on Digital Watermarking

2.4 Applications of Digital Watermarking

Digital Watermarks are potentially useful in many applications, including:

Ownership assertion: Watermarks can be used for ownership assertion. To assert

ownership of an image, Alice can generate a watermarking signal using a secret private

key, and then embed it into the original image. She can then make the watermarked

image publicly available. Later, when Bob contends the ownership of an image derived

from this public image, Alice can produce the unmarked original image and also

demonstrate the presence of her watermark in Bob’s image. Since Alice’s original image

is unavailable to Bob, he cannot do the same. For such a scheme to work, the watermark

has to survive image processing operations aimed at malicious removal. In addition, the

watermark should be inserted in such a manner that it cannot be forged as Alice would

not want to be held accountable for an image that she does not own.

Fingerprinting: In applications where multimedia content is electronically distributed

over a network, the content owner would like to discourage unauthorized duplication and

distribution by embedding a distinct watermark (or a fingerprint) in each copy of the data.

If, at a later point in time, unauthorized copies of the data are found, then the origin of the

copy can be determined by retrieving the fingerprint. In this application the watermark

needs to be invisible and must also be invulnerable to deliberate attempts to forge,

remove or invalidate. Furthermore, and unlike the ownership assertion application, the

watermark should be resistant to collusion. That is, a group of k users with the same

image but containing different fingerprints should not be able to collude and invalidate

any fingerprint or create a copy without any fingerprint.

Copy prevention or control. Watermarks can also be used for copy prevention and

control. For example, in a closed system where the multimedia content needs special

hardware for copying and/or viewing, a digital watermark can be inserted indicating the

number of copies that are permitted. Every time a copy is made the watermark can be

modified by the hardware and after a point the hardware would not create further copies

Page 16: Project Report on Digital Watermarking

of the data. An example of such a system is the Digital Versatile Disc (DVD). In fact, a

copy protection mechanism that includes digital watermarking at its core is currently

being considered for standardization and second generation DVD players may well

include the ability to read watermarks and act based on their presence or absence.

Another example is in digital cinema, where information can be embedded as a

watermark in every frame or a sequence of frames to help investigators locate the scene

of the piracy more quickly and point out weaknesses in security in the movie’s

distribution. The information could include data such as the name of the theater and the

date and time of the screening. The technology would be most useful in fighting a form

of piracy that’s surprisingly common, i.e., when someone uses a camcorder to record the

movie as it’s shown in a theater, then duplicates it onto optical disks or VHS tapes for

distribution.

Fraud and tamper detection. When multimedia content is used for legal purposes,

medical applications, news reporting, and commercial transactions, it is important to

ensure that the content was originated from a specific source and that it had not been

changed, manipulated or falsified. This can be achieved by embedding a watermark in the

data. Subsequently, when the photo is checked, the watermark is extracted using a unique

key associated with the source, and the integrity of the data is verified through the

integrity of the extracted watermark. The watermark can also include information from

the original image that can aid in undoing any modification and recovering the original.

Clearly a watermark used for authentication purposes should not affect the quality of an

image and should be resistant to forgeries. Robustness is not critical as removal of the

watermark renders the content inauthentic and hence of no value.

ID card security. Information in a passport or ID (e.g., passport number, person’s name,

etc.) can also be included in the person’s photo that appears on the ID. By extracting the

embedded information and comparing it to the written text, the ID card can be verified.

The inclusion of the watermark provides an additional level of security in this

application. For example, if the ID card is stolen and the picture is replaced by a forged

copy, the failure in extracting the watermark will invalidate the ID card. The above

Page 17: Project Report on Digital Watermarking

represent a few example applications where digital watermarks could potentially be of

use. In addition there are many other applications in rights management and protection

like tracking use of content, binding content to specific players, automatic billing for

viewing content, broadcast monitoring etc. From the variety of potential applications

exemplified above it is clear that a digital watermarking technique needs to satisfy a

number of requirements. Since the specific requirements vary with the application,

watermarking techniques need to be designed within the context of the entire system in

which they are to be employed. Each application imposes different requirements and

would require different types of invisible or visible watermarking schemes or a

combination thereof. In the remaining sections of this chapter we describe some general

principles and techniques for invisible watermarking. Our aim is to give the reader a

better understanding of the basic principles, inherent trade-offs, strengths, and weakness,

of digital watermarking. We will focus on image watermarking in our discussions and

examples. However as we mentioned earlier, the concepts involved are general in nature

and can be applied to other forms of content such as video and audio.

Broadcasting Monitoring: Commercials are aired by broadcasting channels and stations.

For this advertising firm purchase airtime from broadcasting channel. There are several

organizations and individuals interested in broadcasting monitoring, viz. advertiser, who

want to ensure if his commercial is broadcasted for all of his purchased airtime,

performers, who want to ensure that they get the royalties due to them from advertising

firm and owners of copyrighted works, who want to ensure that their property is not

illegally rebroadcasted by pirate stations. One solution to the problem is human observers

watching the broadcasting which is neither a feasible nor practically possible solution.

The other solution is to match the signal with the signals present in databases to ascertain

advertisers that messages are broadcasted. But matching signals from databases is very

complex process and require large amount of time and money.

The last solution is using watermarking techniques. It has advantage of existing

within content itself, rather than exploiting a particular segment of the broadcast signal,

and is therefore completely compatible with the installed base of broadcast equipment,

including both digital and analog transmission.

Page 18: Project Report on Digital Watermarking

2.5 Attacks on Watermarked Work Below are some significant known attacks: -

2.5.1 Scrambling Attacks:

A scrambling attack is a system-level attack in which the samples of a Work are

scrambled prior to presentation to a watermark detector and then subsequently

descrambled. The type of scrambling can be a simple sample permutation or a more

sophisticated pseudo-random scrambling of the sample values. The degree of scrambling

necessary depends on the detection strategy.

A well-known scrambling attack is the mosaic attack, in which an image is broken into

many small rectangular patches, each too small for reliable watermark detection. These

image segments are then displayed in a table such that the segment edges are adjacent.

The resulting table of small images is perceptually identical to the image prior to

subdivision. This technique can be used in a web application to evade a web-crawling

detector. The scrambling is simply the subdivision of the image into sub images, and the

descrambling is accomplished by the web browser itself.

2.5.2 Pathological Distortions:

For a watermark to be secure against unauthorized removal, it must be robust to

any process that maintains the fidelity of the Work. This process may be a normal

process, in which case we are requiring that a secure watermark be robust. However, it

may also be a process unlikely to occur during the normal processing of the Work. Any

process that maintains the fidelity of the Work could be used by an adversary to

circumvent the detector by masking or eliminating the watermark. The two most common

categories of such pathological distortions, geometric/temporal distortions (attacks on

synchronization) and noise removal distortions

2.4.2.1 Synchronization Attacks:

Many watermarking techniques are sensitive to synchronization. By

disturbing this synchronization, an adversary attempts to mask the watermark

signal. Examples of simple synchronization distortions include delay and time

scaling for audio and video, and rotation, scaling, and translation for images and

video. These simple distortions can be implemented such that they vary over time

Page 19: Project Report on Digital Watermarking

or space. More complex distortions include pitch-preserving scaling and sample

removal in audio, and shearing, horizontal reflection, and column or line removal

in images. Even more complex distortions are possible, such as nonlinear warping

of images.

2.4.2.2 Linear filtering and noise removal attack:

Linear filtering also can be used by an adversary in an attempt to remove a

watermark. For example, a watermark with significant energy in the high

frequencies might be degraded by the application of a low-pass filter. In addition,

any watermarking system for which the added pattern is “noiselike” is susceptible

to noise-removal techniques.

2.5.3 Copy Attacks:

A copy attack occurs when an adversary copies a watermark from one Work to

another. As such, it is a form of unauthorized embedding. The copy attack attempts to

thwart the effectiveness of such systems by estimating the watermark given in an

originally watermarked piece of media, and then adding that watermark to an un-

watermarked piece. In the first scenario listed above, this would allow an attacker to have

an inauthentic image be declared authentic, since it contains a watermark. In the second

scenario, an attacker could flood the market with content which ordinarily would allow a

user to manipulate it as he saw fit, but due to the presence of the watermark, limitations

would be imposed. In this way, schemes which sought to limit use of watermarked media

may prove to be too unpopular for wide distribution.

2.5.4 Ambiguity Attacks:

Ambiguity attacks create the appearance that a watermark has been embedded in a

Work when in fact no such embedding has taken place. An adversary can use this attack

to claim ownership of a distributed Work. He or she may even be able to make an

ownership claim on the original Work. As such, ambiguity attacks can be considered a

form of unauthorized embedding. However, they are usually considered system attacks.

Page 20: Project Report on Digital Watermarking

Chapter 3 Methodology

3.1 Project Flow

The following diagram depicts the complete flow of project with the respective modules

or function names:

3.1.1 Insertion of Watermark Image into Cover Work: -

Fig 3.1 Flowchart showing Insertion of Watermark into Cover Work.

3.1.2 Extraction of Watermark Image from Watermarked Image: -

Fig 3.2 Flowchart showing extraction of watermark from watermarked image

Page 21: Project Report on Digital Watermarking

3.1.3 Calculation of Detection ratio: -

Fig 3.3 Flowchart showing steps to calculate detection ratio

3.2 Step By Step procedure

The following is the step by step procedure with detailed description is as follows:

3.2.1 Read Cover Image:

The first step is to read the cover image (in our case we used a .jpeg image) and

process the image so that SIFT can be applied over the cover image. The .jpeg image,

which is originally RGB, is converted to gray image (pixel values belong to the set [0,

255].Further the image matrix is divided by 256 so as to bring the values in range of [0,

1].After these steps the image is ready for the SIFT to be operated over it to find all the

invariant patches.

3.2.2 SIFT:

Scale-invariant feature transform (or SIFT) is an algorithm in computer

vision to detect and describe local features in images. The algorithm was published

by David Lowe in 1999. For any object in an image, interesting points on the object can

be extracted to provide a "feature description" of the object. This description, extracted

Page 22: Project Report on Digital Watermarking

from a training image, can then be used to identify the object when attempting to locate

the object in a test image containing many other objects. It is important that the set of

features extracted from the training image is robust to changes in image scale, noise,

illumination, and local geometric distortion to perform reliable recognition. Lowe's

patented method can robustly identify objects even among clutter and under partial

occlusion, because his SIFT feature descriptor is invariant to scale, orientation, and

affine distortion, and partially invariant to illumination changes.

The following is an image (Figure 3.1(a)) on which sift is applied to find

keypoints. Initially (Figure 3.1(b)) 832 keypoints locations at maxima and minima of the

difference-of-Gaussian function. After applying a threshold on minimum contrasts, 729

keypoints remain (Figure 3.1(c)). Figure3.1 (d) shows image with 536 keypoints that

remained following an additional threshold.

Fig 3.4. This figure shows the stages of keypoints selection. (a) The 233x189 pixel original image.

(b) The initial 832 keypoints locations at maxima and minima of the DoG function. (c) After

applying a threshold on minimum contrast, 729 keypoints remain. (d) The final 536 keypoints that

remain following an additional threshold.

Page 23: Project Report on Digital Watermarking

The selection of features is important for robust watermarking in content-based

synchronization methods. We believe that local image characteristics are more useful

than global ones. The scale-invariant feature transform, SIFT, extracts features by

considering local image properties and is invariant to rotation, scaling, translation, and

partial illumination changes. We implemented a proposed watermarking method, using

the SIFT, that is robust to geometric distortions. Using the SIFT, we generate circular

patches that are invariant to translation and scaling distortions. The watermark is inserted

into the circular patches in an additive way in the spatial domain. Rotation invariance is

achieved using the translation property of the polar-mapped circular patches. We have

performed an intensive simulation to show the robustness of the proposed method with

25 test images. The simulation results confirm that our method is robust against

geometric distortion attacks as well as signal-processing attacks.

3.2.2.1 The General Mathematical model of SIFT:

Considering local image characteristics, the SIFT descriptor extracts

features and their properties, such as the location (t1, t2), the scale s, and the

orientation.

The SIFT was proposed by Lowe and has proved to be invariant to image

rotation, scaling, translation, partial illumination changes, and projective

transformations. Considering local image characteristics, the SIFT descriptor

extracts features and their properties, such as the location (t1, t2), the scale s, and

the orientation.

The basic idea of the SIFT is to extract features through a staged filtering that

identifies stable points in the scale space:

1. Select candidates for features by searching for peaks in the scale space of

the difference-of-Gaussians (DoG) function.

2. Localize each feature using measures of its stability.

3. Assign orientations based on local image gradient directions.

In order to extract candidate locations for features, the scale space D(x,

y,) is computed using a DoG function. As shown in Fig. 3.2, they successively

Page 24: Project Report on Digital Watermarking

smooth original images with a variable-scale (1, 2, and 3) Gaussian function

and calculate the scale-space images by subtracting two successive smoothed

images. The parameter is a variance (called a scale) of the Gaussian function.

The scale of the scale-space images is determined by the nearby scale (1, 2, or

3) of the Gaussian-smoothed image. In these scale-space images, they retrieve all

local maxima and minima by checking the closest eight neighbors in the same

scale and nine neighbors in the scales above and below. These extrema determine

the location (t1, t2) and the scale s of the SIFT features, which are invariant to the

scale and orientation change of images. In our experiment, to generate the scale-

space images, we apply scales of the Gaussian function from 1.0 to 32.0 and

increase the scale by multiplying by a constant factor 2.

Fig 3.5 Scale space by using Difference-of-Gaussian (DoG) function and neighbor of a

pixel.

After candidate locations have been found, a detailed model is fitted by a 3-D

quadratic function to determine accurately the location (t1, t2) and scale s of each

feature. In addition, candidate locations that have a low contrast or are poorly

localized along edges are removed by measuring the stability of each feature

using a 2-by-2 Hessian matrix H as follows:

Page 25: Project Report on Digital Watermarking

Here e is the ratio of the largest to the smallest Eigen value and is used to control

stability. They use e=10. The quantities Dxx, Dxy, and Dyy are the derivatives of the

scale space images. In order to achieve invariance to image rotation, they assign a

consistent orientation to each feature. In the Gaussian-smoothed image with the

scale of the extracted SIFT features, they calculate gradient orientations of all

sample points within a circular window about a feature location and form an

orientation histogram. The peak in this histogram corresponds to the dominant

direction of that feature.

3.2.2.2 The Modification in Mathematical model of SIFT for Watermarking:

The local features from the SIFT descriptor are not directly applicable to

watermarking, because the number and distribution of the features are dependent

on image contents and textures. Moreover, the SIFT descriptor was originally

devised for image-matching applications, so it extracts many features that have

dense distribution over the whole image. Therefore, we adjust the number,

distribution, and scale of the features and remove those features that are

susceptible to watermark attacks.

The SIFT descriptor extracts features with such properties as their location

(t1, t2), scale s, and orientation. In practice, the orientation property of the SIFT

descriptor of the original image and distorted images do not match precisely.

Hence, we make a circular patch by using only the location (t1, t2) and scale s of

extracted SIFT features, as follows:

Page 26: Project Report on Digital Watermarking

where k is a magnification factor to control the radius of the circular patches. The

way in which this factor is determined is explained in the fourth paragraph of this

subsection. These patches are invariant to image scaling and translation as well as

spatial modifications. By applying a prefilter, such as a Gaussian filter, before

feature extraction, we can reduce the interference of noise and increase the

robustness of extracted circular patches. The scale of features derived from the

SIFT descriptor is related to the scaling factor of the Gaussian function in the

scale space. In our analysis, features whose scale is small have a low probability

of being redetected, because they disappear easily when image contents are

modified. Features whose scale is large also have a low probability of being

redetected in distorted images, because they move easily to other locations.

Moreover, using large-scale features means that patches will overlap each other,

which will result in degradation of the perceptual quality of watermarked images.

Therefore, we remove features whose scale is below a or above b. In our

experiments, we set a and b at 2.0 and 10.0, respectively. The SIFT descriptor

considers image contents so that extracted SIFT features have different properties

in the scale s, depending on image contents. Watermark insertion and detection

necessarily require interpolation to transform the rectangular watermark to match

the shape of patches, and vice versa. In order to minimize the distortion of the

watermark through interpolation, the size (radius) of the patches must be similar

to, or larger than, the size of the watermark. The scale s of extracted SIFT features

varies from 2.0 to 10.0. Therefore, we divide the scale of features into two ranges

and apply different magnification factors k1 and k2, which are determined

empirically on the assumption that the size of the watermarked images will not be

changed excessively. Although the features whose size is near to the boundary of

the range may be susceptible to scaling attacks, there are a number of circular

patches in an image, so that the effect of these features on the watermarking is

small. The distribution of local features is related to the performance of

watermarking systems. In other words, the distance between adjacent features

must be determined carefully. If the distance is small, patches will overlap in

large areas, and if the distance is large, the number of patches will not be

Page 27: Project Report on Digital Watermarking

sufficient for the effective insertion of the watermark. To control the distribution

of extracted features, we apply a circular neighborhood constraint in which the

features whose strength is the largest are used to generate circular patches. The

value from the DoG function is used to measure the strength of each feature. The

distance D between adjacent features depends on the dimensions of the image and

is quantized by the r value as follows:

The width and height of the image are denoted by w and h, respectively. The r

value is a constant to control the distance between adjacent features and is set at

16 and 32 in the insertion and detection processes, respectively. Figure 2 shows a

circular patch from our proposed synchronization method in spatial filters,

additive uniform noise, rotation, and scaling of the image. For convenience of

identification, we represent only one patch and find that the patch is formulated

robustly, even when the image is distorted.

Page 28: Project Report on Digital Watermarking

Fig 3.6Circular patch from our proposed method in (a) the original image, (b) the mean-filtered

image, (c) the median-filtered image, (d) the additive uniform noise image, (e) the 10-deg rotated

image, and (f) the 1.2x scaled image.

3.2.3 Watermark Generation:

We generate a 2-D rectangular watermark that follows a Gaussian distribution,

using a random number generator. To be inserted into circular patches, this watermark

should be transformed so that its shape is circular. We consider the rectangular

watermark to be a polar-mapped watermark and inversely polar-map it to assign the

insertion location of the circular patches. In this way, a rotation attack is mapped as a

translation of the rectangular watermark, and the watermark still can be detected using

the correlation detector. Note that the size of circular patches differs, so we should

generate a separate circular watermark for each patch.

Let the x and y dimensions of the rectangular watermark be denoted by M and N,

respectively. Let r be the radius (size) of a circular patch. As shown in Fig. 3, we divide a

circular patch into homocentric regions.

Page 29: Project Report on Digital Watermarking

Fig 3.7 Polar mapping between rectangular watermark and the circular watermark.

To generate the circular watermark, the x- and the y-axes of the rectangular watermark

are inversely polar-mapped into the radius and angle directions of the patch. The relation

between the coordinates of the rectangular watermark and the circular watermark is

represented as follows:

where x and y are the rectangular watermark coordinates, ri and are the coordinates of

the circular watermark, rM is equal to the radius of the patch, and r0 is a fixed fraction of

rM. In our project, we set r0 to rM /4.

For effective transformation, r0 should be larger than M /, and the difference between

rM and r0 should be larger than N. If these constraints are not satisfied, the rectangular

watermark must be sampled. As a result, it is difficult to transform efficiently. To

increase the robustness and invisibility of the inserted watermark, we transform the

rectangular watermark to be mapped to only the upper half of the patch, i.e., the y-axis of

the rectangular watermark is scaled by the angle of a half circle (), not the angle of a

full circle (2 ). The lower half of the patch is set symmetrically with respect to the

upper half (see Fig. 3).

In aspect of the image, watermarks constitute a kind of noise. When noise of

similar strength gathers together, we can perceive it. In our scheme, a pixel in the

rectangular watermark is mapped to adjacent several pixels in the circular watermark

during polar mapping. In other words, the same noise is inserted into the homocentric

region of a circular patch. Therefore, if the size of the homocentric region is large, the

inserted watermark is visible (as an embossing effect). Through symmetrical mapping,

we can make the size of the homocentric region small and thus render the watermark

Page 30: Project Report on Digital Watermarking

invisible. Moreover, we can increase the likelihood that the watermark will survive

attacks such as cropping.

3.2.4 Watermark Insertion:

The first step in watermark insertion is to analyze image contents to extract the

patches. Then, the watermark is inserted repeatedly into all patches. Our watermark

insertion process is shown in Fig. 4(A).

Step a: To extract circular patches, we use the SIFT descriptor, as explained in

Sec.3.2.2. A single image may contain a number of patches. We insert the

watermark into all patches to increase the robustness of our scheme.

Step b.1.We generates a circular watermark dependent on the radius (size) of each

patch, using the method described in Sec.3.2.3. We have endeavored to construct

the patches so that their radius is similar to, or larger than, the x and y sizes of the

rectangular watermark; thus, during extraction of the patches, a pixel w in the

rectangular watermark is mapped to several pixels wc in the circular watermark.

This compensates for errors in alignment of the circular patches regarding

location and scale during watermark detection.

Step b.2. The insertion of the watermark must not affect the perceptual quality of

images. This constraint has a bearing on the insertion strength of the watermark,

inasmuch as it must be imperceptible to the human eye. We apply the perceptual

mask as follows:

where is the lower bound of visibility in flat and smooth regions and is the upper

bound in edged and texture regions. The noise visibility function is calculated as follows:

where 2

x(ij) and 2

x max denote the local variance and maximum of neighboring pixels

within five pixels, and D is a scaling constant.

Page 31: Project Report on Digital Watermarking

Fig 3.8 Diagrammatic representation of Watermark insertion scheme

Step b.3. Finally, we insert this circular watermark additively into the spatial

domain. The insertion of the watermark is represented as the spatial addition

between the pixels of images and the pixels of the circular watermark as follows:

Here vi and wci denote the pixels of images and of the circular watermark,

respectively, and denotes the perceptual mask that controls the insertion

strength of the watermark.

Page 32: Project Report on Digital Watermarking

3.2.5 Watermark Detection:

Similarly to watermark insertion, the first step for watermark detection is

analyzing the image contents to extract patches. The watermark is then detected from the

patches. If the watermark is detected correctly from at least one patch, we can prove

ownership successfully. Our watermark detection process is shown in Fig. 4(B).

Step a. To extract circular patches, we use the SIFT descriptor, as described in Sec. 2.

There are several patches in an image, and we try to detect the watermark from all

patches.

Step b.1. The additive watermarking method in the spatial domain inserts the watermark

into the image contents as noise. Therefore, we first apply a Wiener filter to extract this

noise by calculating the difference between the watermarked image and its Wiener-

filtered image, and then regard that difference as the retrieved watermark.6 As with the

watermark insertion process, we compensate for the modification by perceptual masks,

but such compensation does not greatly affect the performance of watermark detection.

Step b.2. To measure the similarity between the reference watermark generated during

watermark insertion and the retrieved watermark, the retrieved circular watermark should

be converted into a rectangular watermark by applying the polar-mapping introduced in

Sec3.2.4. Considering the fact that the watermark is inserted symmetrically, we take the

mean value from the two semicircular areas. By this mapping, the rotation of circular

patches is represented as a translation, and hence we achieve rotation invariance for our

watermarking scheme.

Page 33: Project Report on Digital Watermarking

Fig 3.9 Diagrammatic representation of Watermark extraction scheme

Step b.3. We apply circular convolution to the reference watermark and the retrieved

watermark. The degree of similarity between the two, called the response of the

watermark detector, is represented by the maximum value of circular convolution as

follows:

where w is the reference watermark and w* is the retrieved watermark. The range of

similarity values is from −1.0 to 1.0. We can identify the rotation angle (/ r) of the

patches by finding the r with the maximum value. If the similarity exceeds a predefined

threshold, we can be satisfied that the reference watermark has been inserted. The method

of determining the threshold is described in the following section.

Page 34: Project Report on Digital Watermarking

Step c. As mentioned, there are several circular patches in an image. Therefore, if the

watermark is detected from at least one patch, ownership is proved, and not otherwise.

The fact that we insert the watermark into several circular patches, rather than just one,

makes it highly likely that the proposed scheme will detect the watermark, even after

image distortions. Our watermarking scheme is robust against geometric distortion

attacks as well as signal-processing attacks. Scaling and translation invariance is achieved

by extracting circular patches from the SIFT descriptor. Rotation invariance is achieved

by using the translation property of the polar mapped circular patches.

3.2.6 Detection ratio:

This module compares the patches in both original image as well as attacked

image. During watermark detection, the redetection of patches that have been extracted

during watermark insertion is important for robustness. In order to mea sure the

redetection ratio, we first extracted circular patches from both the original image and the

attacked images, and then compared the locations and radii of the patches from the

original image with those of the patches from the attacked images. Prior to the

comparison, we transformed the locations and radii of circular patches from images

subjected to geometric attack to those of patches in the original image. If the difference

between circular patches from the original image and those from attacked images was

below 2 pixels, we regarded the patches as having been redetected correctly.

We applied various attacks: median filter [2x2], [3x3], and [4x4], JPEG

compression quality factor 40, 60, 90, Gaussian filtering [3x3], and scaling 0.7x, 0.8x,

0.9x, 1.1x, 1.2x and 1.3x.

Detection ratio refers to the ratio of the number of extracted patches from attacked

images to the number of correctly redetected patches from original image. Detection

failure refers to the number of images in which no patch is redetected.

Page 35: Project Report on Digital Watermarking

Chapter 4 RESULTS

4.1 Test Images:

4.1.1 Cover work:

Fig 4.1 Original Cover Image

4.1.2 Position of Invariant patches in cover work:

Fig 4.2 Invariant patches present in original cover work

Page 36: Project Report on Digital Watermarking

4.1.3 Watermark image:

Fig 4.3 Watermark image (72x72 pixels)

4.1.4 Cover Image with watermark:

Fig 4.4 Watermarked Image (Invisible)

4.1.5 Retrieved Watermark:

Fig 4.5 Retrieved Watermark Image

Page 37: Project Report on Digital Watermarking

4.2 Performance of watermarking scheme and test results:

We tested the performance of our watermarking scheme. The proposed scheme is tested

for 30 random images for over 7500 patches. Each image used for testing is a .jpeg image of size

150x200 pixels. The size of rectangular watermark we took for testing the scheme is 72x72

pixels and the weighing factors and of noise visibility function was set to 5.0 and 1.0

respectively. We were able to get a detection ratio as high as approx. 85% under various type of

attacks listed in Stirmark 3.1: median filter, JPEG compression, Gaussian filtering, scaling. The

simulation results under attack are shown in Table 4.1. We take into consideration a pixel error

of 2 pixels while redetecting patches, that is if the position of any patch is shifted by +/- 2 pixels

and radius of patch is same we consider patch to be redetected correctly.

Detection ratio refer to the ratio of the number of patches correctly redetected from

watermarked image to total number of patches in which watermark inserted. Among 30 images,

detection failure refers to the number of images where inserted watermark could not be detected

with minimum similarity to prove ownership and hence we fail to prove ownership in those

images. Similarity is the average of similarity values from correctly detected watermark patches.

4.2.2 Test results

Table 4.1 Fraction of correctly detected watermark patches, number of failure images, and similarity under common

signal-processing and geometric attacks

Signal Processing and Geometric Attacks

Detection Ratio Detection Failure Similarity

Watermarked image(no attack)

95.231% 0 0.635

Median Filter 2x2 94.917% 0 0.631 Median Filter 3x3 81.943% 0 0.616 Median Filter 4x4 56.837% 0 0.595

Gaussian Filter 86.871% 0 0.603 Scaling 1.1x 97.823% 0 0.614 Scaling 1.2x 96.363% 0 0.609 Scaling 1.3x 95.155% 0 0.583 Scaling .9x 66.231% 0 0.603 Scaling .8x 34.582% 1 0.508 Scaling .7x 16.750% 2 0.417

JPEG Compression 90 92.661% 0 0.589 JPEG Compression 60 79.905% 2 0.497

Page 38: Project Report on Digital Watermarking

Chapter 5 Conclusion and Future Work

The result set as shown in Table 4-1, clearly depicts the inserted watermark is

successfully detected even after using additive watermarking method in spatial domain, which is

very unlikely as in case of attacks pixel values may change abnormally and it may be difficult to

recover the original pixel value and thus watermark may be lost.

Our major contribution is that we have proposed a robust watermarking scheme that uses

local invariant features. In order to resist geometric distortions, we extracted circular patches

using the SIFT descriptor, which is invariant to translation and scaling distortion. These patches

were watermarked additively in the spatial domain. Rotation invariance was achieved using the

translation property of the polar-mapped circular patches. We performed an intensive simulation,

and the results showed that our method would be robust against geometric distortion attacks as

well as signal-processing attacks. We believe that the consideration of local features is important

for the design of robust watermarking schemes, and our method is a solution that uses such

features

Drawbacks of the proposed watermarking scheme are related to its vulnerability to large

distortion of the aspect ratio. In addition, due to the computation time for the SIFT descriptor and

for the compensation of alignment errors, our scheme cannot be used effectively in real-time

applications.

Future work will focus on eliminating those drawbacks. In future this work can also be

extended for inserting watermark on videos. A Video is a sequence of images, called as frames,

and these frames are more or less same with slight changes and thus position of patches may not

vary considerably in adjacent patches. This property may be exploited to derive a new technique

for watermarking on videos. The time complexity may be an issue as a lot of computation needs

to be done and computational time for SIFT descriptor is already very large.

Page 39: Project Report on Digital Watermarking

Appendix A

The following are the signature and brief description of functions used during

implementation of the proposed scheme:

1. processWatermark:

Input parameters:

o watermarkFileName

o radius

Output parameters:

o W: processed watermark image matrix

o P: radius matrix of circular watermark

o Q: theta matrix of circular watermark

Description: This module performs the polar mapping of rectangular

watermark to circular watermark.

2. insertWatremark:

Input parameters:

o I: cover work

o W: processed Watermark

o X: x-co-ordinate

o Y: y-co-ordinate

Output parameters:

o I: watermarked image

Description: This module inserts watermark into image.

3. extractWatermark:

Input parameters:

o I: watermarked Image

o I1: original cover work

o X: x-co-ordinate

o Y: y-co-ordinate

o [a,b]:size of watermark

Page 40: Project Report on Digital Watermarking

Output parameters:

o RW: retrieved watermark

Description: This module extract watermark from watermarked image.

4. compareWatermark:

Input parameters:

o W: reference watermark

o RW: retrieved watermark

o Diff: Pixel Error

Output parameters:

o Ratio: similarity ratio.

Description: This module compares the retrieved watermark with

reference watermark and gives the similarity as a ratio.

5. calculateDetectionratio:

Input parameters:

o frame: sift frame matrix for original cover work

o f1: sift frame matrix for attacked image

o diff: pixel error

Output parameters:

o ratio: detection ratio

Description: This module calculates the detection ratio for the attacked

image.

Page 41: Project Report on Digital Watermarking

References

[1] H.Y. lee, H.S. Kim and H.K. Lee, “Robust image watermarking using local invariant

features” optical engineering vol45 (3)(2006)037002(page 1-11)

[2] D.G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints” International

Journal of Computer Vision 60(2) (2004) page 91-110.

[3] Leida LI, Xiaoping YUAN, Zhaolin LU, Jeng-Shyang PAN “Rotation Invariant Watermark

Embedding Based on Scale-Adapted Characteristic Regions” Informational Sciences (November

2009) page 1-22.

[4] Xia-mu Niu, Zhe-ming Lu, Sheng-ho Sun, “Digital Watermarking of Still Images with Gray-

Level Digital Watermarks” IEEE transaction on Consumer Electronics, Vol. 46, No.1 (February

2000) page 137-145.

[5]Patrick Bas, Jean-Marc Chassery, Benoit Macq, “Geometrically Invariant Watermarking

Using Feature points” IEEE Transactions on Image Processing, VOL.11, NO.9 (September

2002) page 1014-1028.

[6]Yanqun Zhang, “Digital Watermarking Technology: A Review”2009 ETP International

Conference on Future Computer and Communication page- 250-252.

[7]Yiwei Wang, John F. Doherty, Robert E. Van Dyck, “A Wavelet-Based Watermarking

Algorithm for Ownership Verification of Digital Images” IEEE Transactions on Image

Processing, Vol.11, NO.2 (February 2002) page 77-86.

[8]A. Nikolaidis and I. Pitas, “Region-based Image Watermarking” IEEE Transactions on Image

Processing, VOL.10, NO.11 (2001) page 1726-1740.

[9] Book on Digital Watermarking and Steganography by Ingemar J. Cox and Matthew L.

Miller, The Morgan Kaufmann Series in Multimedia Information and Systems, Second Edition.