SlideShare une entreprise Scribd logo
1  sur  8
Secure DCT-SVD Domain Image Watermarking:
                  Embedding Data in All Frequencies
      Alexander Sverdlov                                  Scott Dexter                              Ahmet M. Eskicioglu
     The Graduate Center                      Department of CIS, Brooklyn College            Department of CIS, Brooklyn College
The City University of New York                     2900 Bedford Avenue                             2900 Bedford Avenue
365 Fifth Avenue, NY, NY 10016                       Brooklyn, NY 11210                              Brooklyn, NY 11210
       Tel: 212-817-8190                              Tel: 718-951-3125                               Tel: 718-758-8481
 sverdlov@sci.brooklyn.cuny.edu                  sdexter@sci.brooklyn.cuny.edu                eskicioglu@sci.brooklyn.cuny.edu


ABSTRACT
                                                                      1. INTRODUCTION
Both Discrete Cosine Transform (DCT) and Singular Value
                                                                      Watermarking (data hiding) [1,2,3] is the process of embedding
Decomposition (SVD) have been used as mathematical tools for
                                                                      data into a multimedia element such as image, audio or video.
embedding data into an image. In the DCT-domain, the DCT
                                                                      This embedded data can later be extracted from, or detected in,
coefficients are modified by the elements of a pseudo-random
                                                                      the multimedia for security purposes. A watermarking algorithm
sequence of real values. In the SVD domain, a common approach
                                                                      consists of the watermark structure, an embedding algorithm, and
is to modify the singular values by the singular values of a visual
                                                                      an extraction, or a detection, algorithm. Watermarks can be
watermark. In this paper, we present a new robust hybrid
                                                                      embedded in the pixel domain or a transform domain. In
watermarking schemes based on DCT and SVD. After applying
                                                                      multimedia applications, embedded watermarks should be
the DCT to the cover image, we map the DCT coefficients in a
                                                                      invisible, robust, and have a high capacity [4]. Invisibility refers
zig-zag order into four quadrants, and apply the SVD to each
                                                                      to the degree of distortion introduced by the watermark and its
quadrant. These four quadrants represent frequency bands from
                                                                      affect on the viewers or listeners. Robustness is the resistance of
the lowest to the highest. The singular values in each quadrant
                                                                      an embedded watermark against intentional attacks, and normal
are then modified by the singular values of the DCT-transformed
                                                                      A/V processes such as noise, filtering (blurring, sharpening, etc.),
visual watermark. We assume that the size of the visual
                                                                      resampling, scaling, rotation, cropping, and lossy compression.
watermark is one quarter of the size of the cover image.
                                                                      Capacity is the amount of data that can be represented by an
Modification in all frequencies enables a watermarking scheme
                                                                      embedded watermark. The approaches used in watermarking still
that is robust to normal A/V processes or intentional attacks that
                                                                      images include least-significant bit encoding, basic M-sequence,
destroy the watermark in either lower or higher frequencies. We
                                                                      transform techniques, and image-adaptive techniques [5].
show that embedding data in lowest frequencies is resistant to one
set of attacks while embedding data in highest frequencies is         Typical uses of watermarks include copyright protection
resistant to another set of attacks. The only exception is the        (identification of the origin of content, tracing illegally distributed
rotation attack for which the data embedded in middle frequencies     copies) and disabling unauthorized access to content.
survive better.                                                       Requirements and characteristics for the digital watermarks in
                                                                      these scenarios are different, in general. Identification of the
Categories and Subject Descriptors                                    origin of content requires the embedding of a single watermark
K.4.4 [Computers and Society]:          Electronic Commerce -         into the content at the source of distribution. To trace illegal
cybercash, digital cash, distributed commercial transactions,         copies, a unique watermark is needed based on the location or
electronic data interchange (EDI), intellectual property, payment     identity of the recipient in the multimedia network. In both of
schemes, security.                                                    these applications, watermark extraction or detection needs to
                                                                      take place only when there is a dispute regarding the ownership of
General Terms          Security                                       content. For access control, the watermark should be checked in
                                                                      every authorized consumer device used to receive the content.
Keywords       copyright protection, discrete cosine transform,
                                                                      Note that the cost of a watermarking system will depend on the
image watermarking, multimedia, singular value decomposition.
                                                                      intended use, and may vary considerably.
                                                                      Two widely used image compression standards are JPEG and
                                                                      JPEG2000. The former is based on the Discrete Cosine
                                                                      Transform (DCT), and the latter the Discrete Wavelet Transform
                                                                      (DWT). In recent years, many watermarking schemes have been
                                                                      developed using these popular transforms.
                                                                      In all frequency domain watermarking schemes, there is a conflict
                                                                      between robustness and transparency. If the watermark is
                                                                      embedded in perceptually most significant components, the
                                                                      scheme would be robust to attacks but the watermark may be



                                                                                                                                           1
difficult to hide. On the other hand, if the watermark is embedded      2. DCT-SVD DOMAIN WATERMARKING
in perceptually insignificant components, it would be easier to
hide the watermark but the scheme may be less resistant to
attacks.                                                                The process of separating the frequency bands using the DWT is
                                                                        well-defined.     In two-dimensional DWT, each level of
In image watermarking, two distinct approaches have been used           decomposition produces four bands of data denoted by LL, HL,
to represent the watermark. In the first approach, the watermark        LH, and HH. The LL subband can further be decomposed to
is generally represented as a sequence of randomly generated real       obtain another level of decomposition.
numbers having a normal distribution with zero mean and unity
variance [6,7,8,9,10].     In the second approach, a picture            In two-dimensional DCT, we apply the transformation to the
representing a company logo or other copyright information is           whole image but need to map the frequency coefficients from the
embedded in the cover image [11,12,13,14,15,16].                        lowest to the highest in a zig-zag order to 4 quadrants in order to
                                                                        apply SVD to each block. All the quadrants will have the same
A few years ago, a third transform called Singular Value                number of DCT coefficients. For example, if the cover image is
Decomposition (SVD) was explored for watermarking. The SVD              512x512, the number of DCT coefficients in each block will be
for square matrices was discovered independently by Beltrami in         65,536. To differentiate these blocks from the DWT bands, we
1873 and Jordan in 1874, and extended to rectangular matrices by        will label them B1, B2, B3, B4. This process is depicted in
Eckart and Young in the 1930s. It was not used as a                     Figure 1.
computational tool until the 1960s because of the need for
sophisticated numerical techniques. In later years, Gene Golub          In pure DCT-based watermarking, the DCT coefficients are
demonstrated its usefulness and feasibility as a tool in a variety of   modified to embed the watermark data. Because of the conflict
applications [17]. SVD is one of the most useful tools of linear        between robustness and transparency, the modification is usually
algebra with several applications in image compression                  made in middle frequencies, avoiding the lowest and highest
[18,19,20,21,22,23], watermarking [14,15,16], and other signal          bands.
processing fields [24,25,26,27].
A recent paper [28] on DWT-based multiple watermarking argues
that embedding a visual watermark in both low and high                                                               B1       B2
frequencies results in a robust scheme that can resist to different
kinds of attacks. Embedding in low frequencies increases the
robustness with respect to attacks that have low pass                                                                B3       B4
characteristics like filtering, lossy compression and geometric
distortions while making the scheme more sensitive to
modifications of the image histogram, such as contrast/brightness
adjustment, gamma correction, and histogram equalization.                     Figure 1. Mapping of DCT coefficients into 4 blocks
Watermarks embedded in middle and high frequencies are
typically less robust to low-pass filtering, lossy compression, and     Every real matrix A can be decomposed into a product of 3
small geometric deformations of the image but are highly robust         matrices A = UΣVT, where U and V are orthogonal matrices, UTU
with respect to noise adding, and nonlinear deformations of the         = I, VTV = I, and Σ = diag (λ1, λ2, ...). The diagonal entries of Σ
gray scale. Arguing that advantages and disadvantages of low            are called the singular values of A, the columns of U are called the
and middle-to-high frequency watermarks are complementary, the          left singular vectors of A, and the columns of V are called the
authors propose a new scheme where two different visual                 right singular vectors of A. This decomposition is known as the
watermarks are embedded in one image. Both watermarks are               Singular Value Decomposition (SVD) of A, and can be written as
binary images, one contains the letters CO, and the other EP
against a white background. The cover image is the picture of a                   A = λ1U1V1 + λ2U2V2 + … + λr UrVr,
young girl. Two levels of decomposition are performed on the
                                                                        where r is the rank of matrix A. It is important to note that each
cover image. The watermark CO is embedded in the second level
                                                                        singular value specifies the luminance of an image layer while the
LL, and the watermark EP is embedded in the second level HH.
                                                                        corresponding pair of singular vectors specifies the geometry of
The experiments show that embedding in the LL subband is
                                                                        the image.
robust against JPEG compression, wiener filtering, Gaussian
noise, scaling, and cropping while embedding in the HH subband          In SVD-based watermarking, several approaches are possible. A
is robust against histogram equalization, intensity adjustment, and     common approach is to apply SVD to the whole cover image, and
gamma correction. Extracted watermarks appear to have similar           modify all the singular values to embed the watermark data.
quality after the Gaussian noise attack only. We noticed that the
embedded watermark is highly visible in all parts of the cover          In this paper, we will combine DCT and SVD to develop a new
image.      The degradation is pronounced especially in low             hybrid image watermarking scheme that is resistant to a variety of
frequency areas (e.g., the wall behind the young girl), resulting in    attacks. The proposed scheme is given by the following
a loss in the commercial value of the image.                            algorithm:

In this paper, we generalize the above scheme to four subbands          Assume the size of visual watermark is nxn, and the size of the
using DCT-SVD watermarking.                                             cover image is 2nx2n.




                                                                                                                                          2
Watermark embedding:                                                                 The magnitudes of the singular values for each quadrant of the
                                                                                     cover image Lena used in our experiments are given in Table 1.
1.   Apply the DCT to the whole cover image A.                                       The DCT coefficients with the highest magnitude are found in the
                                                                                     B1 quadrant, and those with the lowest coefficients are found in
2.   Using the zig-zag sequence, map the DCT coefficients into 4                     the B4 quadrant. Correspondingly, the singular values with the
     quadrants: B1, B2, B3, and B4.                                                  highest magnitudes are in the B1 quadrant, and the singular values
3.   Apply              SVD                to            each           quadrant:    with the lowest magnitudes are in the B4 quadrant.
         k             k      k     kT
     A           =U         Σ     V      , k = 1,2,3,4, where k
         DCT           a DCT a DCT a DCT                                             Table 1. Singular values of transformed Lena in 4 quadrants

     denotes B1, B2, B3, and B4 quadrants, and                  λ ,
                                                                 k
                                                                 i     i = 1,…,n       25000000




                                           k
     are the singular values of Σ                .
                                                                                       20000000



                                           a DCT
                                                                                       15000000

4.   Apply DCT to the whole visual watermark W.
5.   Apply SVD to the DCT-transformed visual watermark WDCT:                           10000000




                                          T
     W           =U            Σ        V      , where λwi, i = 1,…,n are               5000000



         DCT           w DCT       w DCT w DCT
                                                                                                0


     the singular values of Σ                   .
                                                                                                    1        18        35    52    69    86    103    120    137   154   171   188   205   222   239   256



                                      w DCT                                                                                                    (a) B1
6.   Modify the singular values in each quadrant Bk, k = 1,2,3,4,                      250000


     with the singular values of the DCT-transformed visual
     watermark:        λ*k = λik + α k λ wi , i = 1,…,n.
                        i
                                                                                       200000




7.   Obtain      the    4      sets   of      modified     DCT       coefficients:     150000




         *k            k      *k    kT
     A           =U         Σ     V      , k = 1,2,3,4.                                100000


         DCT           a DCT a DCT a DCT
                                                                                        50000

8.   Map the modified DCT coefficients back to their original
     positions.                                                                             0
                                                                                                1       18        35        52    69    86    103    120    137    154   171   188   205   222   239   256



9.   Apply the inverse DCT to produce the watermarked cover                                                                                    (b) B2
     image.                                                                            150000




Watermark extraction:                                                                  120000




1.   Apply the DCT to the whole watermarked (and possibly                               90000




                                      *
     attacked) cover image A .                                                          60000




2.   Using the zig-zag sequence, map the DCT coefficients into 4                        30000

     quadrants: B1, B2, B3, and B4.
                                                    *k     k * k kT
                                                         =U Σ V
                                                                                            0

3.   Apply SVD to each quadrant: A                                  ,k=                         1       18        35        52    69    86    103    120    137    154   171   188   205   222   239   256


                                                           a a a                                                                               (c) B3
     1,2,3,4, where k denotes the attacked quadrants.
                                                                                       100000



4.   Extract the singular values from each quadrant Bk, k =
                 λk = (λ*k − λik ) / α k , , i = 1,…,n.
                                                                                        80000


     1,2,3,4:     wi    i
                                                                                        60000

5.   Construct the DCT coefficients of the four visual watermarks
     using the singular vectors:                                                        40000




             kk      k     kT
     W     =U      Σ     V      , k = 1,2,3,4.                                          20000

       DCT    w DCT w DCT w DCT
                                                                                            0

6.   Apply the inverse DCT to each set to construct the four                                    1       18        35        52    69    86    103    120    137    154   171   188   205   222   239   256




     visual watermarks.                                                                                                                        (d) B4




                                                                                                                                                                                                         3
We also computed the largest singular values of the DCT
coefficients in the four quadrants for six other common test
images. They are given in Table 2 together with Lena’s. The
general trend is a decrease in their magnitudes as we go from the
B1 quadrant to the B4 quadrant. The magnitudes of the largest
singular values in the B2, B3, and B4 quadrants have the same
order of magnitude. So, instead of assigning a different scaling
factor for each quadrant, we decided to use only two values: One
value for B1, and a smaller value for the other three quadrants.

         Table 2. Largest singular values in 4 quadrants
                                                                          Cover image: Lena            Watermark: Boat
  Image/
                    B1            B2          B3           B4
  Quadrant


  Mandrill      18,478,800      820,423    556,3534    380,236


  Lena          24,019,900      236,304     130,947     88,132


  Barbara       29,737,800      893,738     635,670    199,455

  Boat          32,007,000      377,477     166,474     89,828             Watermarked Lena                Extracted Watermarks

                                                                             Figure 2. Watermark embedding/extraction
  Goldhill      35,067,000      339,540     228,007    114,731
                                                                    Table 3 includes the constructed watermarks from all quadrants
                                                                    for a given attack. The numbers below the images indicate the
  Peppers       37,421,400      259,615     174,685    248,779
                                                                    Pearson product moment correlation between the original vector
                                                                    of singular values and extracted vector of singular values for each
  Airplane      57,248,500      291,741     118,816     65,230      quadrant. The Pearson product moment correlation coefficient is
                                                                    a dimensionless index that ranges from -1.0 to 1.0, and reflects
                                                                    the extent of a linear relationship between two data sets. Negative
                                                                    coefficients imply that the singular values are very much different
                                                                    from those of the reference watermark. The observer is able to
3. EXPERIMENTS                                                      evaluate the quality of constructed watermarks subjectively
Figure 2 shows the 512x512 gray scale cover image Lena, the         through a visual comparison with the reference watermark. The
256X256 gray scale visual watermark Boat, the watermarked           other alternative is to correlate the extracted singular values with
cover image, and the visual watermarks constructed from the four    those of the reference watermark using the correlation coefficient.
quadrants. In the experiments, we used the scaling factor 0.25
                                                                    According to Table 3, the watermarks constructed from the four
for B1, and 0.01 for the other three quadrants.
                                                                    quadrants look different for each attack. It is possible to classify
The DCT-SVD based watermarking scheme was tested using              the attacks into three groups:
twelve attacks. The DCT was performed using the FFTW library
                                                                    1.   Watermark embedding in the B1 quadrant is resistant to
[29], and the SVD was performed using an implementation of the
                                                                         Gaussian blur, Gaussian noise, pixelation, JPEG
CLAPACK library for MacOS 10.3 [30]. The chosen attacks
                                                                         compression, JPEG2000 compression, sharpening, and
were Gaussian blur, Gaussian noise, pixelation, JPEG
                                                                         rescaling.
compression, JPEG 2000 compression, sharpening, rescaling,
rotation, cropping, contrast adjustment, histogram equalization,    2.   Watermark embedding in the B4 quadrant is resistant to,
and gamma correction.                                                    cropping, contrast adjustment, histogram equalization, and
                                                                         gamma correction.
The attacked images are presented in Figure 3 together with the
tools and parameters used for the attacks.                          3.   Watermark embedding in the B2 quadrant is resistant to
                                                                         rotation.




                                                                                                                                      4
Gaussian Blur 5x5              Gaussian Noise 0.3                  Pixelate 2




    JPEG 30:1                     JPEG2000 50:1                     Sharpen 80




Rescale 512→256→512                 Rotate 20º                 Symmetric Crop (25%)




    Contrast -20              Histogram Equalization           Gamma Correction 0.6




                      Figure 3. Attacked Watermarked Images.




                                                                                      5
Table 3. Extracted Watermarks
   Gaussian Blur 5x5              Gaussian Noise 0.3                      Pixelate 2




0.9894           -0.2173        0.9942          0.2318          0.9939           0.3629
-0.2261          -0.2136        0.2199          0.2083          0.4833           -0.2035
       JPEG 30:1                    JPEG2000 50:1                     Sharpen 80




0.9998          -0.2662         0.9994                -0.1568   0.9275           0.5974
-0.0874         -0.1036         0.0437                -0.1852   0.7303           0.8117
 Rescale 512→256→512                     Rotate 20º              Symmetric Crop (25%)




0.9957            -0.2114      -0.8977            0.7617        -0.9813         0.4790
-0.0450           -0.1458      0.6095             0.4426        0.9990          0.9990
      Contrast -20               Histogram Equalization          Gamma Correction 0.6




0.9883            0.9687        0.5870                0.8045    -0.9857                0.9918
0.9845            0.9941        0.8800                0.9148    0.9975                 0.9993




                                                                                                6
4. CONCLUSIONS                                                                           ˆ          ˆ 2
                                                                                ∑ W (i )W (i ) / ∑ W (i ) , and
                                                                                i                i
Our observations regarding the proposed watermarking scheme
can be summarized as follows:                                                                     2          2
                                                                                       ˆ                   ˆ
                                                                              ∑ W (i )W (i ) / ∑ W (i ) ∑ W (i ) ,
•   SVD is a very convenient tool for watermarking in the                     i                i        i
    DCT domain. We observed that the scaling factor can be
                                                                         where W is the vector of singular values of the reference
    chosen from a fairly wide range of values for B1, and also
    for the other three quadrants. As the B1 quadrant contains                           ˆ
                                                                         watermark, and W is the vector of extracted singular
    the largest DCT coefficients, the scaling factor is chosen           values.
    accordingly. When the scaling factor for B1 is raised to an
    unreasonable value, the image contrast becomes higher          •     Experimentation with multiple images will enable a better
    while an increase in the scaling factor for the other                understanding of the proposed watermarking scheme. As
    quadrants results in diagonal artifacts that are visible             different images may have singular values with different
    especially in low frequency areas.                                   magnitudes, what would be a general formula for
                                                                         determining the values of the scaling factor for each
•   In most DCT-based watermarking schemes, the lowest                   quadrant?
    frequency coefficients are not modified as it is argued that
    watermark transparency would be lost. In the DCT-SVD           •     In SVD watermarking, we embed singular values into
    based approach, we experienced no problem in modifying               singular values. Variations of this approach can be
    the B1 quadrant.                                                     considered. For example, instead of embedding singular
                                                                         values, any other vector that represents some information
•   Watermarks inserted in the lowest frequencies (B1                    may be used.
    quadrant) are resistant to one group of attacks, and
    watermarks embedded in highest frequencies (B4 quadrant)       3. ACKNOWLEDGMENTS
    are resistant to another group of attacks. If the same
    watermark is embedded in 4 blocks, it would be extremely       Our thanks to Mr. Emir Ganic for the image input/output code
    difficult to remove or destroy the watermark from all          that was used in this work.
    frequencies.
•   In some cases, embedding in the B2 and B3 quadrants is         4. REFERENCES
    also resistant to certain attacks. Two examples of those
    attacks are histogram equalization and gamma correction.
    After the cropping attack, singular value extraction in the    [1]     C. I. Podilchuk and E. J. Delp, “Digital Watermarking:
    B3 and B4 quadrants produce almost identical results (as               Algorithms and Applications,” IEEE Signal Processing
    displayed by visual quality and correlation coefficient).              Magazine, July 2001, pp. 33-46.

•   One advantage of SVD-based watermarking is that there is       [2]     I. J. Cox, M. L. Miller, and J. A. Bloom, Digital
    no need to embed all the singular values of a visual                   Watermarking, Morgan Kaufmann Publishers, 2002.
    watermark. Depending on the magnitudes of the largest          [3]     E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J.
    singular values, it would be sufficient to embed only a                Delp, “Advances in Digital Video Content Protection,”
    small set. This SVD property has in fact been exploited to             Proceedings of the IEEE, Special Issue on Advances in
    develop algorithms for lossy image compression.                        Video Coding and Delivery, 2004.
•   Observers can evaluate the quality of constructed              [4]     F. Hartung and M. Kutter, “Multimedia Watermarking
    watermarks either subjectively or objectively.          In             Techniques,” Proceedings of the IEEE, Vol. 87, No. 7,
    subjective evaluation, the reference watermark is compared             July 1999, pp. 1079-1107.
    with the watermark constructed after an attack. In
    objective evaluation, statistical measures like Pearson’s      [5]     R. B. Wolfgang, C. I. Podilchuk and E. J. Delp,
    correlation coefficient can be used, not requiring the                 “Perceptual Watermarks for Digital Images and Video,”
    singular vectors of the watermark image. For automatic                 Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp.
    watermark detection, the highest value of the correlation              1108-1126.
    coefficient can be used to identify the quadrant with the      [6]     I. J. Cox, J. Kilian, T. Leighton and T. Shamoon,
    highest resistance.                                                    “Secure    Spread    Spectrum    Watermarking   for
In future research, our investigation will include different               Multimedia,” IEEE Transactions on Image Processing,
similarity measures, multiple images, and different watermark              6(12), December 1997, pp. 1673-1687.
representations:                                                   [7]     X.-G. Xia, C. G. Boncelet and G. R. Arce, “A
•   Different measures can be used to show the similarity                  Multiresolution Watermark for Digital Images,”
    between the reference and the extracted singular values.               Proceedings of the 1997 International Conference on
    Two examples of such a measure are                                     Image Processing, Washington, DC, October 26-29,
                                                                           1997.




                                                                                                                                7
[8]    M. Barni, F. Bartolini, V. Cappellini, A. Piva, “A DCT-   [20]   D. P. O’Leary and S. Peleg, “Digital Image Compression
       Domain System for Robust Image Watermarking,”                    by Outer Product Expansion,” IEEE Transactions on
       Signal Processing, Volume 66, No. 3, May 1998, pp.               Communications, 31(3), March 1983, pp. 441-444.
       357-372.
                                                                 [21]   J. F. Yang and C. L. Lu, “Combined Techniques of
[9]    W. Zhu, Z. Xiong and Y.-Q. Zhang, “Multiresolution
                                                                        Singular    Value      Decomposition   and    Vector
       Watermarking for Images and Video,” IEEE
                                                                        Quantization,” IEEE Transactions on Image Processing,
       Transactions on Circuits and Systems for Video
                                                                        4(8), August 1995, pp. 1141-1146.
       Technology, Volume 9, No. 4, June 1999, pp. 545-550.
                                                                 [22]   P. Waldemar and T. A. Ramstad, “Hybrid KLT-SVD
[10]   V. Fotopoulos and A. N. Skodras, “A Subband DCT
                                                                        Image Compression,” 1997 IEEE International
       Approach to Image Watermarking,” Proceedings of X
                                                                        Conference on Acoustics, Speech and Signal Processing,
       European Signal Processing Conference, Tampere,
                                                                        Vol. 4, Munich, Germany, April 21-24, 1997, pp. 2713-
       Finland, September 4 - 8, 2000.
                                                                        2716.
[11]   J. J. Chae and B. S. Manjunath, “A Robust Embedded
                                                                 [23]   S. O. Aase, J. H. Husoy and P. Waldemar, “A Critique
       Data from Wavelet Coefficients,” Proceedings of the
                                                                        of SVD-Based Image Coding Systems,” 1999 IEEE
       SPIE International Conference on Storage and Retrieval
                                                                        International Symposium on Circuits and Systems VLSI,
       for Image and Video Databases VI, San Jose, CA,
                                                                        Vol. 4, Orlando, FL, May 1999, pp. 13-16.
       January 28-30, 1998, Vol. 3312, pp. 308-317.
                                                                 [24]   K. Konstantinides and G. S. Yovanof, “Improved
[12]   S. D. Lin and C.-F. Chen, “A Robust DCT-Based
                                                                        Compression Performance Using SVD-Based Filters for
       Watermarking for Copyright Protection,” IEEE
                                                                        Still Images,” SPIE Proceedings, Vol. 2418, San Jose,
       Transactions on Consumer Electronics, Volume 46, No.
                                                                        CA, February 7-8, 1995, pp. 100-106.
       3, August 2000, pp. 415-421.
                                                                 [25]   K. Konstantinides and G. S. Yovanof, “Application of
[13]   Y. Wang, J. F. Doherty and R. E. Van Dyck, “A
                                                                        SVD-Based Spatial Filtering to Video Sequences,” 1995
       Wavelet-Based Watermarking Algorithm for Ownership
                                                                        IEEE International Conference on Acoustics, Speech
       Verification of Digital Images,” IEEE Transactions on
                                                                        and Signal Processing, Vol. 4, Detroit, MI, May 9-12,
       Image Processing, Volume 11, No. 2, February 2002,
                                                                        1995, pp. 2193-2196.
       pp. 77-88.
                                                                 [26]   K. Konstantinides, B. Natarajan and G. S. Yovanof,
[14]   V. I. Gorodetski, L. J. Popyack, V. Samoilov and V. A.
                                                                        “Noise Estimation and Filtering Using Block-Based
       Skormin, “SVD-based Approach to Transparent
                                                                        Singular Value Decomposition,” IEEE Transactions on
       Embedding Data into Digital Images,” International
                                                                        Image Processing, 3(3), March 1997, pp. 479-483.
       Workshop on Mathematical Methods, Models and
       Architectures for Computer Network Security (MMM-         [27]   R. Karkarala and P. O. Ogunbona, “Signal Analysis
       ACNS 2001), St. Petersbug, Russia, May 21-23, 2001.              Using a Multiresolution Form of the Singular Value
                                                                        Decomposition,” IEEE Transactions on Image
[15]   D. V. S. Chandra, “Digital Image Watermarking Using
                                                                        Processing, 10(5), May 2001, pp. 724-735.
       Singular Value Decomposition,” Proceedings of 45th
       IEEE Midwest Symposium on Circuits and Systems,           [28]   R. Mehul and R. Priti, “Discrete Wavelet Transform
       Tulsa, OK, August 2002, pp. 264-267.                             Based Multiple Watermarking Scheme,” Proceedings
                                                                        of IEEE Region 10 Technical Conference on Convergent
[16]   R. Liu and T. Tan, “A SVD-Based Watermarking
                                                                        Technologies for the Asia-Pacific, Bangalore, India,
       Scheme for Protecting Rightful Ownership,” IEEE
                                                                        October 14-17, 2003.
       Transactions on Multimedia, 4(1), March 2002, pp.121-
       128.                                                      [29]   M. Frigo and S. G. Johnson, “FFTW: An Adaptive
                                                                        Software Architecture for the FFT,” Proceedings of
[17]   D. Kahaner, C. Moler and S. Nash, Numerical Methods
                                                                        1998 IEEE International Conference on Acoustics
       and Software (New Jersey: Prentice-Hall, Inc, 1989).
                                                                        Speech and Signal Processing,” Vol. 3, Seattle, WA,
[18]   H. C. Andrews and C. L. Patterson, “Singular Value               May 12-15, 1998, pp. 1381-1384.
       Decomposition (SVD) Image Coding,” IEEE
                                                                 [30]   http://developer.apple.com/hardware/ve
       Transactions on Communications, 24(4), April 1976, pp.
       425-432.
[19]   N. Garguir, “Comparative Performance of SVD and
       Adaptive Cosine Transform in Coding Images,” IEEE
       Transactions on Communications, 27(8), August 1979,
       pp. 1230-1234.




                                                                                                                            8

Contenu connexe

Tendances

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...Iftikhar Ahmad
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
Coordination of Resource-Constrained Devices through a Distributed Semantic S...
Coordination of Resource-Constrained Devices through a Distributed Semantic S...Coordination of Resource-Constrained Devices through a Distributed Semantic S...
Coordination of Resource-Constrained Devices through a Distributed Semantic S...Open University, KMi
 
Distributed Localization for Wireless Distributed Networks in Indoor Environm...
Distributed Localization for Wireless Distributed Networks in Indoor Environm...Distributed Localization for Wireless Distributed Networks in Indoor Environm...
Distributed Localization for Wireless Distributed Networks in Indoor Environm...Hermie Mendoza
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMDIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMacijjournal
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
Chapter 3 slides
Chapter 3 slidesChapter 3 slides
Chapter 3 slideslara_ays
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...Naoki Shibata
 

Tendances (20)

robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
E04122330
E04122330E04122330
E04122330
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Coordination of Resource-Constrained Devices through a Distributed Semantic S...
Coordination of Resource-Constrained Devices through a Distributed Semantic S...Coordination of Resource-Constrained Devices through a Distributed Semantic S...
Coordination of Resource-Constrained Devices through a Distributed Semantic S...
 
Distributed Localization for Wireless Distributed Networks in Indoor Environm...
Distributed Localization for Wireless Distributed Networks in Indoor Environm...Distributed Localization for Wireless Distributed Networks in Indoor Environm...
Distributed Localization for Wireless Distributed Networks in Indoor Environm...
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMDIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Chapter 3 slides
Chapter 3 slidesChapter 3 slides
Chapter 3 slides
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
 

En vedette

уиирс 2 маъруза
уиирс 2 маърузауиирс 2 маъруза
уиирс 2 маърузаXushnud Pulatov
 
Resume updated 10-15-16
Resume updated 10-15-16Resume updated 10-15-16
Resume updated 10-15-16alex lanza
 
Sophois3030 estrutura1
Sophois3030 estrutura1Sophois3030 estrutura1
Sophois3030 estrutura1Reinaldo Silva
 
The profession of Astronomers
The profession of Astronomers The profession of Astronomers
The profession of Astronomers Sophia Kouzouli
 
Gobierno SOA - Estructura, Organización, Repositorio, Entregables, Capacidades
Gobierno SOA - Estructura, Organización, Repositorio, Entregables, CapacidadesGobierno SOA - Estructura, Organización, Repositorio, Entregables, Capacidades
Gobierno SOA - Estructura, Organización, Repositorio, Entregables, CapacidadesIntellego Chile
 
Strausser - Business Development - Infographic
Strausser - Business Development - InfographicStrausser - Business Development - Infographic
Strausser - Business Development - InfographicDavid Strausser
 
[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie
[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie
[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vieJean-Philippe Briend
 
Pp civica el estado
Pp civica el estadoPp civica el estado
Pp civica el estadoana carrasco
 
Civica páginas 18 a 22
Civica páginas 18 a 22Civica páginas 18 a 22
Civica páginas 18 a 22ana carrasco
 
Nike - Strategic Marketing
Nike - Strategic MarketingNike - Strategic Marketing
Nike - Strategic MarketingMrudula Kavuri
 

En vedette (18)

уиирс 2 маъруза
уиирс 2 маърузауиирс 2 маъруза
уиирс 2 маъруза
 
Recycling in Antiquity
Recycling in AntiquityRecycling in Antiquity
Recycling in Antiquity
 
Portrait 2
Portrait 2Portrait 2
Portrait 2
 
DensityGuide Arlington
DensityGuide ArlingtonDensityGuide Arlington
DensityGuide Arlington
 
Simbolos
SimbolosSimbolos
Simbolos
 
Resume updated 10-15-16
Resume updated 10-15-16Resume updated 10-15-16
Resume updated 10-15-16
 
Sophois3030 estrutura1
Sophois3030 estrutura1Sophois3030 estrutura1
Sophois3030 estrutura1
 
The profession of Astronomers
The profession of Astronomers The profession of Astronomers
The profession of Astronomers
 
Gobierno SOA - Estructura, Organización, Repositorio, Entregables, Capacidades
Gobierno SOA - Estructura, Organización, Repositorio, Entregables, CapacidadesGobierno SOA - Estructura, Organización, Repositorio, Entregables, Capacidades
Gobierno SOA - Estructura, Organización, Repositorio, Entregables, Capacidades
 
ICT_ ewaste commerce
ICT_ ewaste  commerceICT_ ewaste  commerce
ICT_ ewaste commerce
 
Strausser - Business Development - Infographic
Strausser - Business Development - InfographicStrausser - Business Development - Infographic
Strausser - Business Development - Infographic
 
[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie
[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie
[DevFest Nantes 2016] Les Pipelines Jenkins dans la vraie vie
 
Family, Peers, Education
Family, Peers, EducationFamily, Peers, Education
Family, Peers, Education
 
Pp civica el estado
Pp civica el estadoPp civica el estado
Pp civica el estado
 
O que é ser cidadão
O que é ser cidadãoO que é ser cidadão
O que é ser cidadão
 
Civica páginas 18 a 22
Civica páginas 18 a 22Civica páginas 18 a 22
Civica páginas 18 a 22
 
munna_IT
munna_ITmunna_IT
munna_IT
 
Nike - Strategic Marketing
Nike - Strategic MarketingNike - Strategic Marketing
Nike - Strategic Marketing
 

Similaire à ieee title

SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Watermarking in digital images
Watermarking in digital imagesWatermarking in digital images
Watermarking in digital imagesRabin BK
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
Spread spectrum watermarking Seminar
Spread spectrum watermarking SeminarSpread spectrum watermarking Seminar
Spread spectrum watermarking SeminarDebkumar_Bera
 

Similaire à ieee title (20)

Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
G0523444
G0523444G0523444
G0523444
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Watermarking in digital images
Watermarking in digital imagesWatermarking in digital images
Watermarking in digital images
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
Spread spectrum watermarking Seminar
Spread spectrum watermarking SeminarSpread spectrum watermarking Seminar
Spread spectrum watermarking Seminar
 

Dernier

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Dernier (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

ieee title

  • 1. Secure DCT-SVD Domain Image Watermarking: Embedding Data in All Frequencies Alexander Sverdlov Scott Dexter Ahmet M. Eskicioglu The Graduate Center Department of CIS, Brooklyn College Department of CIS, Brooklyn College The City University of New York 2900 Bedford Avenue 2900 Bedford Avenue 365 Fifth Avenue, NY, NY 10016 Brooklyn, NY 11210 Brooklyn, NY 11210 Tel: 212-817-8190 Tel: 718-951-3125 Tel: 718-758-8481 sverdlov@sci.brooklyn.cuny.edu sdexter@sci.brooklyn.cuny.edu eskicioglu@sci.brooklyn.cuny.edu ABSTRACT 1. INTRODUCTION Both Discrete Cosine Transform (DCT) and Singular Value Watermarking (data hiding) [1,2,3] is the process of embedding Decomposition (SVD) have been used as mathematical tools for data into a multimedia element such as image, audio or video. embedding data into an image. In the DCT-domain, the DCT This embedded data can later be extracted from, or detected in, coefficients are modified by the elements of a pseudo-random the multimedia for security purposes. A watermarking algorithm sequence of real values. In the SVD domain, a common approach consists of the watermark structure, an embedding algorithm, and is to modify the singular values by the singular values of a visual an extraction, or a detection, algorithm. Watermarks can be watermark. In this paper, we present a new robust hybrid embedded in the pixel domain or a transform domain. In watermarking schemes based on DCT and SVD. After applying multimedia applications, embedded watermarks should be the DCT to the cover image, we map the DCT coefficients in a invisible, robust, and have a high capacity [4]. Invisibility refers zig-zag order into four quadrants, and apply the SVD to each to the degree of distortion introduced by the watermark and its quadrant. These four quadrants represent frequency bands from affect on the viewers or listeners. Robustness is the resistance of the lowest to the highest. The singular values in each quadrant an embedded watermark against intentional attacks, and normal are then modified by the singular values of the DCT-transformed A/V processes such as noise, filtering (blurring, sharpening, etc.), visual watermark. We assume that the size of the visual resampling, scaling, rotation, cropping, and lossy compression. watermark is one quarter of the size of the cover image. Capacity is the amount of data that can be represented by an Modification in all frequencies enables a watermarking scheme embedded watermark. The approaches used in watermarking still that is robust to normal A/V processes or intentional attacks that images include least-significant bit encoding, basic M-sequence, destroy the watermark in either lower or higher frequencies. We transform techniques, and image-adaptive techniques [5]. show that embedding data in lowest frequencies is resistant to one set of attacks while embedding data in highest frequencies is Typical uses of watermarks include copyright protection resistant to another set of attacks. The only exception is the (identification of the origin of content, tracing illegally distributed rotation attack for which the data embedded in middle frequencies copies) and disabling unauthorized access to content. survive better. Requirements and characteristics for the digital watermarks in these scenarios are different, in general. Identification of the Categories and Subject Descriptors origin of content requires the embedding of a single watermark K.4.4 [Computers and Society]: Electronic Commerce - into the content at the source of distribution. To trace illegal cybercash, digital cash, distributed commercial transactions, copies, a unique watermark is needed based on the location or electronic data interchange (EDI), intellectual property, payment identity of the recipient in the multimedia network. In both of schemes, security. these applications, watermark extraction or detection needs to take place only when there is a dispute regarding the ownership of General Terms Security content. For access control, the watermark should be checked in every authorized consumer device used to receive the content. Keywords copyright protection, discrete cosine transform, Note that the cost of a watermarking system will depend on the image watermarking, multimedia, singular value decomposition. intended use, and may vary considerably. Two widely used image compression standards are JPEG and JPEG2000. The former is based on the Discrete Cosine Transform (DCT), and the latter the Discrete Wavelet Transform (DWT). In recent years, many watermarking schemes have been developed using these popular transforms. In all frequency domain watermarking schemes, there is a conflict between robustness and transparency. If the watermark is embedded in perceptually most significant components, the scheme would be robust to attacks but the watermark may be 1
  • 2. difficult to hide. On the other hand, if the watermark is embedded 2. DCT-SVD DOMAIN WATERMARKING in perceptually insignificant components, it would be easier to hide the watermark but the scheme may be less resistant to attacks. The process of separating the frequency bands using the DWT is well-defined. In two-dimensional DWT, each level of In image watermarking, two distinct approaches have been used decomposition produces four bands of data denoted by LL, HL, to represent the watermark. In the first approach, the watermark LH, and HH. The LL subband can further be decomposed to is generally represented as a sequence of randomly generated real obtain another level of decomposition. numbers having a normal distribution with zero mean and unity variance [6,7,8,9,10]. In the second approach, a picture In two-dimensional DCT, we apply the transformation to the representing a company logo or other copyright information is whole image but need to map the frequency coefficients from the embedded in the cover image [11,12,13,14,15,16]. lowest to the highest in a zig-zag order to 4 quadrants in order to apply SVD to each block. All the quadrants will have the same A few years ago, a third transform called Singular Value number of DCT coefficients. For example, if the cover image is Decomposition (SVD) was explored for watermarking. The SVD 512x512, the number of DCT coefficients in each block will be for square matrices was discovered independently by Beltrami in 65,536. To differentiate these blocks from the DWT bands, we 1873 and Jordan in 1874, and extended to rectangular matrices by will label them B1, B2, B3, B4. This process is depicted in Eckart and Young in the 1930s. It was not used as a Figure 1. computational tool until the 1960s because of the need for sophisticated numerical techniques. In later years, Gene Golub In pure DCT-based watermarking, the DCT coefficients are demonstrated its usefulness and feasibility as a tool in a variety of modified to embed the watermark data. Because of the conflict applications [17]. SVD is one of the most useful tools of linear between robustness and transparency, the modification is usually algebra with several applications in image compression made in middle frequencies, avoiding the lowest and highest [18,19,20,21,22,23], watermarking [14,15,16], and other signal bands. processing fields [24,25,26,27]. A recent paper [28] on DWT-based multiple watermarking argues that embedding a visual watermark in both low and high B1 B2 frequencies results in a robust scheme that can resist to different kinds of attacks. Embedding in low frequencies increases the robustness with respect to attacks that have low pass B3 B4 characteristics like filtering, lossy compression and geometric distortions while making the scheme more sensitive to modifications of the image histogram, such as contrast/brightness adjustment, gamma correction, and histogram equalization. Figure 1. Mapping of DCT coefficients into 4 blocks Watermarks embedded in middle and high frequencies are typically less robust to low-pass filtering, lossy compression, and Every real matrix A can be decomposed into a product of 3 small geometric deformations of the image but are highly robust matrices A = UΣVT, where U and V are orthogonal matrices, UTU with respect to noise adding, and nonlinear deformations of the = I, VTV = I, and Σ = diag (λ1, λ2, ...). The diagonal entries of Σ gray scale. Arguing that advantages and disadvantages of low are called the singular values of A, the columns of U are called the and middle-to-high frequency watermarks are complementary, the left singular vectors of A, and the columns of V are called the authors propose a new scheme where two different visual right singular vectors of A. This decomposition is known as the watermarks are embedded in one image. Both watermarks are Singular Value Decomposition (SVD) of A, and can be written as binary images, one contains the letters CO, and the other EP against a white background. The cover image is the picture of a A = λ1U1V1 + λ2U2V2 + … + λr UrVr, young girl. Two levels of decomposition are performed on the where r is the rank of matrix A. It is important to note that each cover image. The watermark CO is embedded in the second level singular value specifies the luminance of an image layer while the LL, and the watermark EP is embedded in the second level HH. corresponding pair of singular vectors specifies the geometry of The experiments show that embedding in the LL subband is the image. robust against JPEG compression, wiener filtering, Gaussian noise, scaling, and cropping while embedding in the HH subband In SVD-based watermarking, several approaches are possible. A is robust against histogram equalization, intensity adjustment, and common approach is to apply SVD to the whole cover image, and gamma correction. Extracted watermarks appear to have similar modify all the singular values to embed the watermark data. quality after the Gaussian noise attack only. We noticed that the embedded watermark is highly visible in all parts of the cover In this paper, we will combine DCT and SVD to develop a new image. The degradation is pronounced especially in low hybrid image watermarking scheme that is resistant to a variety of frequency areas (e.g., the wall behind the young girl), resulting in attacks. The proposed scheme is given by the following a loss in the commercial value of the image. algorithm: In this paper, we generalize the above scheme to four subbands Assume the size of visual watermark is nxn, and the size of the using DCT-SVD watermarking. cover image is 2nx2n. 2
  • 3. Watermark embedding: The magnitudes of the singular values for each quadrant of the cover image Lena used in our experiments are given in Table 1. 1. Apply the DCT to the whole cover image A. The DCT coefficients with the highest magnitude are found in the B1 quadrant, and those with the lowest coefficients are found in 2. Using the zig-zag sequence, map the DCT coefficients into 4 the B4 quadrant. Correspondingly, the singular values with the quadrants: B1, B2, B3, and B4. highest magnitudes are in the B1 quadrant, and the singular values 3. Apply SVD to each quadrant: with the lowest magnitudes are in the B4 quadrant. k k k kT A =U Σ V , k = 1,2,3,4, where k DCT a DCT a DCT a DCT Table 1. Singular values of transformed Lena in 4 quadrants denotes B1, B2, B3, and B4 quadrants, and λ , k i i = 1,…,n 25000000 k are the singular values of Σ . 20000000 a DCT 15000000 4. Apply DCT to the whole visual watermark W. 5. Apply SVD to the DCT-transformed visual watermark WDCT: 10000000 T W =U Σ V , where λwi, i = 1,…,n are 5000000 DCT w DCT w DCT w DCT 0 the singular values of Σ . 1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256 w DCT (a) B1 6. Modify the singular values in each quadrant Bk, k = 1,2,3,4, 250000 with the singular values of the DCT-transformed visual watermark: λ*k = λik + α k λ wi , i = 1,…,n. i 200000 7. Obtain the 4 sets of modified DCT coefficients: 150000 *k k *k kT A =U Σ V , k = 1,2,3,4. 100000 DCT a DCT a DCT a DCT 50000 8. Map the modified DCT coefficients back to their original positions. 0 1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256 9. Apply the inverse DCT to produce the watermarked cover (b) B2 image. 150000 Watermark extraction: 120000 1. Apply the DCT to the whole watermarked (and possibly 90000 * attacked) cover image A . 60000 2. Using the zig-zag sequence, map the DCT coefficients into 4 30000 quadrants: B1, B2, B3, and B4. *k k * k kT =U Σ V 0 3. Apply SVD to each quadrant: A ,k= 1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256 a a a (c) B3 1,2,3,4, where k denotes the attacked quadrants. 100000 4. Extract the singular values from each quadrant Bk, k = λk = (λ*k − λik ) / α k , , i = 1,…,n. 80000 1,2,3,4: wi i 60000 5. Construct the DCT coefficients of the four visual watermarks using the singular vectors: 40000 kk k kT W =U Σ V , k = 1,2,3,4. 20000 DCT w DCT w DCT w DCT 0 6. Apply the inverse DCT to each set to construct the four 1 18 35 52 69 86 103 120 137 154 171 188 205 222 239 256 visual watermarks. (d) B4 3
  • 4. We also computed the largest singular values of the DCT coefficients in the four quadrants for six other common test images. They are given in Table 2 together with Lena’s. The general trend is a decrease in their magnitudes as we go from the B1 quadrant to the B4 quadrant. The magnitudes of the largest singular values in the B2, B3, and B4 quadrants have the same order of magnitude. So, instead of assigning a different scaling factor for each quadrant, we decided to use only two values: One value for B1, and a smaller value for the other three quadrants. Table 2. Largest singular values in 4 quadrants Cover image: Lena Watermark: Boat Image/ B1 B2 B3 B4 Quadrant Mandrill 18,478,800 820,423 556,3534 380,236 Lena 24,019,900 236,304 130,947 88,132 Barbara 29,737,800 893,738 635,670 199,455 Boat 32,007,000 377,477 166,474 89,828 Watermarked Lena Extracted Watermarks Figure 2. Watermark embedding/extraction Goldhill 35,067,000 339,540 228,007 114,731 Table 3 includes the constructed watermarks from all quadrants for a given attack. The numbers below the images indicate the Peppers 37,421,400 259,615 174,685 248,779 Pearson product moment correlation between the original vector of singular values and extracted vector of singular values for each Airplane 57,248,500 291,741 118,816 65,230 quadrant. The Pearson product moment correlation coefficient is a dimensionless index that ranges from -1.0 to 1.0, and reflects the extent of a linear relationship between two data sets. Negative coefficients imply that the singular values are very much different from those of the reference watermark. The observer is able to 3. EXPERIMENTS evaluate the quality of constructed watermarks subjectively Figure 2 shows the 512x512 gray scale cover image Lena, the through a visual comparison with the reference watermark. The 256X256 gray scale visual watermark Boat, the watermarked other alternative is to correlate the extracted singular values with cover image, and the visual watermarks constructed from the four those of the reference watermark using the correlation coefficient. quadrants. In the experiments, we used the scaling factor 0.25 According to Table 3, the watermarks constructed from the four for B1, and 0.01 for the other three quadrants. quadrants look different for each attack. It is possible to classify The DCT-SVD based watermarking scheme was tested using the attacks into three groups: twelve attacks. The DCT was performed using the FFTW library 1. Watermark embedding in the B1 quadrant is resistant to [29], and the SVD was performed using an implementation of the Gaussian blur, Gaussian noise, pixelation, JPEG CLAPACK library for MacOS 10.3 [30]. The chosen attacks compression, JPEG2000 compression, sharpening, and were Gaussian blur, Gaussian noise, pixelation, JPEG rescaling. compression, JPEG 2000 compression, sharpening, rescaling, rotation, cropping, contrast adjustment, histogram equalization, 2. Watermark embedding in the B4 quadrant is resistant to, and gamma correction. cropping, contrast adjustment, histogram equalization, and gamma correction. The attacked images are presented in Figure 3 together with the tools and parameters used for the attacks. 3. Watermark embedding in the B2 quadrant is resistant to rotation. 4
  • 5. Gaussian Blur 5x5 Gaussian Noise 0.3 Pixelate 2 JPEG 30:1 JPEG2000 50:1 Sharpen 80 Rescale 512→256→512 Rotate 20º Symmetric Crop (25%) Contrast -20 Histogram Equalization Gamma Correction 0.6 Figure 3. Attacked Watermarked Images. 5
  • 6. Table 3. Extracted Watermarks Gaussian Blur 5x5 Gaussian Noise 0.3 Pixelate 2 0.9894 -0.2173 0.9942 0.2318 0.9939 0.3629 -0.2261 -0.2136 0.2199 0.2083 0.4833 -0.2035 JPEG 30:1 JPEG2000 50:1 Sharpen 80 0.9998 -0.2662 0.9994 -0.1568 0.9275 0.5974 -0.0874 -0.1036 0.0437 -0.1852 0.7303 0.8117 Rescale 512→256→512 Rotate 20º Symmetric Crop (25%) 0.9957 -0.2114 -0.8977 0.7617 -0.9813 0.4790 -0.0450 -0.1458 0.6095 0.4426 0.9990 0.9990 Contrast -20 Histogram Equalization Gamma Correction 0.6 0.9883 0.9687 0.5870 0.8045 -0.9857 0.9918 0.9845 0.9941 0.8800 0.9148 0.9975 0.9993 6
  • 7. 4. CONCLUSIONS ˆ ˆ 2 ∑ W (i )W (i ) / ∑ W (i ) , and i i Our observations regarding the proposed watermarking scheme can be summarized as follows: 2 2 ˆ ˆ ∑ W (i )W (i ) / ∑ W (i ) ∑ W (i ) , • SVD is a very convenient tool for watermarking in the i i i DCT domain. We observed that the scaling factor can be where W is the vector of singular values of the reference chosen from a fairly wide range of values for B1, and also for the other three quadrants. As the B1 quadrant contains ˆ watermark, and W is the vector of extracted singular the largest DCT coefficients, the scaling factor is chosen values. accordingly. When the scaling factor for B1 is raised to an unreasonable value, the image contrast becomes higher • Experimentation with multiple images will enable a better while an increase in the scaling factor for the other understanding of the proposed watermarking scheme. As quadrants results in diagonal artifacts that are visible different images may have singular values with different especially in low frequency areas. magnitudes, what would be a general formula for determining the values of the scaling factor for each • In most DCT-based watermarking schemes, the lowest quadrant? frequency coefficients are not modified as it is argued that watermark transparency would be lost. In the DCT-SVD • In SVD watermarking, we embed singular values into based approach, we experienced no problem in modifying singular values. Variations of this approach can be the B1 quadrant. considered. For example, instead of embedding singular values, any other vector that represents some information • Watermarks inserted in the lowest frequencies (B1 may be used. quadrant) are resistant to one group of attacks, and watermarks embedded in highest frequencies (B4 quadrant) 3. ACKNOWLEDGMENTS are resistant to another group of attacks. If the same watermark is embedded in 4 blocks, it would be extremely Our thanks to Mr. Emir Ganic for the image input/output code difficult to remove or destroy the watermark from all that was used in this work. frequencies. • In some cases, embedding in the B2 and B3 quadrants is 4. REFERENCES also resistant to certain attacks. Two examples of those attacks are histogram equalization and gamma correction. After the cropping attack, singular value extraction in the [1] C. I. Podilchuk and E. J. Delp, “Digital Watermarking: B3 and B4 quadrants produce almost identical results (as Algorithms and Applications,” IEEE Signal Processing displayed by visual quality and correlation coefficient). Magazine, July 2001, pp. 33-46. • One advantage of SVD-based watermarking is that there is [2] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital no need to embed all the singular values of a visual Watermarking, Morgan Kaufmann Publishers, 2002. watermark. Depending on the magnitudes of the largest [3] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. singular values, it would be sufficient to embed only a Delp, “Advances in Digital Video Content Protection,” small set. This SVD property has in fact been exploited to Proceedings of the IEEE, Special Issue on Advances in develop algorithms for lossy image compression. Video Coding and Delivery, 2004. • Observers can evaluate the quality of constructed [4] F. Hartung and M. Kutter, “Multimedia Watermarking watermarks either subjectively or objectively. In Techniques,” Proceedings of the IEEE, Vol. 87, No. 7, subjective evaluation, the reference watermark is compared July 1999, pp. 1079-1107. with the watermark constructed after an attack. In objective evaluation, statistical measures like Pearson’s [5] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, correlation coefficient can be used, not requiring the “Perceptual Watermarks for Digital Images and Video,” singular vectors of the watermark image. For automatic Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. watermark detection, the highest value of the correlation 1108-1126. coefficient can be used to identify the quadrant with the [6] I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, highest resistance. “Secure Spread Spectrum Watermarking for In future research, our investigation will include different Multimedia,” IEEE Transactions on Image Processing, similarity measures, multiple images, and different watermark 6(12), December 1997, pp. 1673-1687. representations: [7] X.-G. Xia, C. G. Boncelet and G. R. Arce, “A • Different measures can be used to show the similarity Multiresolution Watermark for Digital Images,” between the reference and the extracted singular values. Proceedings of the 1997 International Conference on Two examples of such a measure are Image Processing, Washington, DC, October 26-29, 1997. 7
  • 8. [8] M. Barni, F. Bartolini, V. Cappellini, A. Piva, “A DCT- [20] D. P. O’Leary and S. Peleg, “Digital Image Compression Domain System for Robust Image Watermarking,” by Outer Product Expansion,” IEEE Transactions on Signal Processing, Volume 66, No. 3, May 1998, pp. Communications, 31(3), March 1983, pp. 441-444. 357-372. [21] J. F. Yang and C. L. Lu, “Combined Techniques of [9] W. Zhu, Z. Xiong and Y.-Q. Zhang, “Multiresolution Singular Value Decomposition and Vector Watermarking for Images and Video,” IEEE Quantization,” IEEE Transactions on Image Processing, Transactions on Circuits and Systems for Video 4(8), August 1995, pp. 1141-1146. Technology, Volume 9, No. 4, June 1999, pp. 545-550. [22] P. Waldemar and T. A. Ramstad, “Hybrid KLT-SVD [10] V. Fotopoulos and A. N. Skodras, “A Subband DCT Image Compression,” 1997 IEEE International Approach to Image Watermarking,” Proceedings of X Conference on Acoustics, Speech and Signal Processing, European Signal Processing Conference, Tampere, Vol. 4, Munich, Germany, April 21-24, 1997, pp. 2713- Finland, September 4 - 8, 2000. 2716. [11] J. J. Chae and B. S. Manjunath, “A Robust Embedded [23] S. O. Aase, J. H. Husoy and P. Waldemar, “A Critique Data from Wavelet Coefficients,” Proceedings of the of SVD-Based Image Coding Systems,” 1999 IEEE SPIE International Conference on Storage and Retrieval International Symposium on Circuits and Systems VLSI, for Image and Video Databases VI, San Jose, CA, Vol. 4, Orlando, FL, May 1999, pp. 13-16. January 28-30, 1998, Vol. 3312, pp. 308-317. [24] K. Konstantinides and G. S. Yovanof, “Improved [12] S. D. Lin and C.-F. Chen, “A Robust DCT-Based Compression Performance Using SVD-Based Filters for Watermarking for Copyright Protection,” IEEE Still Images,” SPIE Proceedings, Vol. 2418, San Jose, Transactions on Consumer Electronics, Volume 46, No. CA, February 7-8, 1995, pp. 100-106. 3, August 2000, pp. 415-421. [25] K. Konstantinides and G. S. Yovanof, “Application of [13] Y. Wang, J. F. Doherty and R. E. Van Dyck, “A SVD-Based Spatial Filtering to Video Sequences,” 1995 Wavelet-Based Watermarking Algorithm for Ownership IEEE International Conference on Acoustics, Speech Verification of Digital Images,” IEEE Transactions on and Signal Processing, Vol. 4, Detroit, MI, May 9-12, Image Processing, Volume 11, No. 2, February 2002, 1995, pp. 2193-2196. pp. 77-88. [26] K. Konstantinides, B. Natarajan and G. S. Yovanof, [14] V. I. Gorodetski, L. J. Popyack, V. Samoilov and V. A. “Noise Estimation and Filtering Using Block-Based Skormin, “SVD-based Approach to Transparent Singular Value Decomposition,” IEEE Transactions on Embedding Data into Digital Images,” International Image Processing, 3(3), March 1997, pp. 479-483. Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM- [27] R. Karkarala and P. O. Ogunbona, “Signal Analysis ACNS 2001), St. Petersbug, Russia, May 21-23, 2001. Using a Multiresolution Form of the Singular Value Decomposition,” IEEE Transactions on Image [15] D. V. S. Chandra, “Digital Image Watermarking Using Processing, 10(5), May 2001, pp. 724-735. Singular Value Decomposition,” Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems, [28] R. Mehul and R. Priti, “Discrete Wavelet Transform Tulsa, OK, August 2002, pp. 264-267. Based Multiple Watermarking Scheme,” Proceedings of IEEE Region 10 Technical Conference on Convergent [16] R. Liu and T. Tan, “A SVD-Based Watermarking Technologies for the Asia-Pacific, Bangalore, India, Scheme for Protecting Rightful Ownership,” IEEE October 14-17, 2003. Transactions on Multimedia, 4(1), March 2002, pp.121- 128. [29] M. Frigo and S. G. Johnson, “FFTW: An Adaptive Software Architecture for the FFT,” Proceedings of [17] D. Kahaner, C. Moler and S. Nash, Numerical Methods 1998 IEEE International Conference on Acoustics and Software (New Jersey: Prentice-Hall, Inc, 1989). Speech and Signal Processing,” Vol. 3, Seattle, WA, [18] H. C. Andrews and C. L. Patterson, “Singular Value May 12-15, 1998, pp. 1381-1384. Decomposition (SVD) Image Coding,” IEEE [30] http://developer.apple.com/hardware/ve Transactions on Communications, 24(4), April 1976, pp. 425-432. [19] N. Garguir, “Comparative Performance of SVD and Adaptive Cosine Transform in Coding Images,” IEEE Transactions on Communications, 27(8), August 1979, pp. 1230-1234. 8