11 - Chapter 3
11 - Chapter 3
CHAPTER 3
3.1 INTRODUCTION
Color images are more important in our daily life which can
provide more information than grayscale images. The color images can hide a
greater amount of data and attain higher fidelity because the color perception
depends on not only the luminance but also the chrominance. Over the last
few decades, numerous watermarking methods have been developed and
tested with the aim of providing reliable ways of proving image ownership for
gray scale images. Some of the gray level images watermarking schemes are
also extended to the color images. However, their application to color images
might not be completely inadequate since they do not take implication of
HVS into consideration and in particular, its sensitivity to color brightness
and perception (Lusson et al 2013).
the watermark is computed and LSB of every byte within the cover image is
overwritten. For example, Rajendra Acharya et al (2001) embeds encrypted
version of Electronic Patient Record (EPR) by replacing the LSB of gray
levels. The text file containing the patient’s data is encrypted by the logarithm
of ASCII codes of the text, the graphical signals are compressed and
subsequently interleaved with images. They pointed out the reduction of
storage and transmission overheads as a result of inserting patient information
in images. Moreover, direct embedding in medical images is not secure. LSB
manipulation is a fast and relatively inexpensive way of watermarking, but
tends to be vulnerable to spatial changes resulting from any image processing
or lossy compression methods such as JPEG.
The characteristics of the HVS are better captured by the transform domain
coefficients and hence watermarking in this domain gains more importance.
Important transforms used in image watermarking applications are briefly
explained below:
Lin & Chen (2000) embedded the watermark bits in low frequency
DCT coefficients by changing LSB. But, it suffers from low robustness
against JPEG compression because of the loss of bits after quantization of
DCT coefficients. Chu (2003) used image sub sampling to obtain subsampled
images and then each sub image is DCT transformed which resulted in higher
memory requirement for implementation. It is relatively weak under JPEG
compression and low pass filtering. Patra et al (2010) used a simple Chinese
Remainder Theorem based scheme with a good robustness against common
image processing operations. But, it is not a blind scheme and not robust to
severe noise attacks owing to the random spread of noise over the DCT
coefficients which adversely affect the extraction process.
form an image, but only having a set of samples which is large enough to
fully describe the spatial domain image. DFT uses phase modulation
components to embed watermarks because it causes fewer distortions in
images. Many researchers have used DFT to embed watermarks (Cheng &
Huang 2003, Pun 2006, Poljicak et al 2011). But these methods are not robust
to cropping and translation attacks.
Contourlet Attack
Transform
Sub bands
GLCM Construction
Inverse
a11 ... ... a1n Contourlet Contourlet
Transform Transform
a21 ... ... a2 n
... ... ... ...
an1 ... ... ann n n
Secret key
Watermark XOR
generation
XOR
Concatenate
Resultant
sub bands
Ownership-id
Ownership-id
XOR
Extracted watermark
owner. Figure 3.4 and Figure 3.5 show the secret key and watermark
generation algorithms respectively.
=[ , ,…… ]
=( + + )/
random number is used for uniquely identifying the owner. The following
steps are contained in the watermark generation process:
3. = binary( ).
5. = binary ( ).
7. = length( ) .
8. If ( = ) , go to Step 10.
else if ( < ), then pad ( ) zeros to the string and go to step 10.
9. If ( > ),
= ceil ( / ).
= ( × ) .
Pad zeros to .
bands as in the existing algorithms, the proposed hybrid method uses PCA for
the selection of less correlated sub bands with the aim of imperceptible
watermark embedding. PCA is applied to every low frequency and high
frequency bands of the contourlet transform, from which a less correlated low
frequency sub band and a less correlated high frequency sub band are
selected for embedding the watermark. Split the image into three color
channels, RGB. For each channel, the watermark embedding algorithm given
in Figure 3.6 is applied.
3. = binary ( ) ; = binary ( ).
This hybrid method requires only the secret key and the binary
user identification number for watermark extraction and hence it is a blind
scheme. The watermark is computed using and as per the watermark
generation procedure. At the extraction stage, the watermarked image is
61
decomposed into three color channels (RGB) and the least correlated sub
bands and containing the watermarks are obtained after applying the
contourlet transform and PCA. The values are XOR-ed with and the
resultant sub bands are again XOR-ed with and respectively to extract
the watermark . The extracted watermark is compared with the computed
watermark for verification.
If the user inputs an invalid secret key, then the XOR operation
creates a noise in the image, so that the embedded watermark cannot be
extracted properly. The major benefit of this scheme is that only the person,
who has a valid secret key, can claim as the owner of the image. The
computational complexity of the proposed scheme is O ( ) where is the
number of pixels in the image.
3.4.1 Transparency
255
= 10 (dB) (3.1)
where MSE is the mean square error between host and watermarked images.
Figure 3.7 shows the host Lena, Baboon and Pepper images and their
corresponding watermarked counterparts. It is highly difficult to find the
difference between the watermarked and the original images in vision. The
PSNR values of the watermarked images are 54.68, 53.55 and 58.32 dB
respectively. It is obvious from Table 3.1 that watermarked images are of
higher PSNR values greater than 53.55 dB with very high quality.
3.4.2 Capacity
among the watermarked images, Baboon has minimum payload and Fruits has
maximum payload and this is due to the fact that capacity is image dependent.
3.4.3 Robustness
(, ) (, )
( , )= (3.2)
2
(, ) 2
(, )
Bit Error Rate (BER): Bit error rate is also used to measure the robustness
of the proposed scheme against common image processing and signal
processing attacks. BER is the ratio of wrongly extracted watermarked bits to
the total number of watermark bits embedded. Lesser the BER, more robust
the watermark is towards attacks. The BER value will be zero if the image is
not subjected to any attack.
= ( , )/ (3.3)
( , ) =1
1 ( )( ( )
) ( ) (3.4)
.
factor 5. Figure 3.8 depicts the high NC values even after JPEG compression
of quality factor 70 for different images.
0.95
0.9
JPEG 70
NC values
Gaussian noise(0.01)
0.85
Rotation(0.5 degrees)
0.8
Scaling(0.2)
0.75
0.7
Figure 3.8 NC values against JPEG, noise, rotation and scaling attacks
Noise attacks: The Gaussian and salt and pepper noise attacks of noise
density 0.01 are tested. From Table 3.2, one can see that the corresponding
BER values are less than 5% which indicates the higher robustness of the
scheme against Gaussian noise and salt & pepper noise attacks. Also Figure
67
3.8 indicates that the resulting higher NC values are really high and 0.98 for
all test images under noise attacks.
Image scaling: The watermarked images are scaled down by 2% and 5%.
The reduced images are re-scaled back to its original dimensions and the
watermarks are extracted. Table 3.2 shows the BER values of the extracted
watermarks under scaling attacks. It is observed that BER is around 7%.
Figure 3.8 shows that the NC values are between 0.95 and 0.97 which
indicates that the embedded watermark is more affected by scaling attack than
any other attacks.
Filtering attacks: Different types of ltering attacks have been tested, such
as Gaussian, sharpening, wiener and median filters of different window sizes
to the watermarked images. The corresponding results are shown in Table 3.2
and Figure 3.9. Obviously, the proposed scheme resists the specified attacks
and the watermark survives with higher NC values between 0.93 to 0.99. NC
values are exactly 1 for Gaussian and median filters. It is interesting to see
that the BER values after Gaussian filtering is zero for all test images. The
experimental results show high robustness of the scheme against Gaussian,
wiener and median filter attacks.
68
Table 3.2 BER (%) of the extracted watermarks under common image
& signal processing attacks
Images
Attacks Amount of distortion
Lena Baboon Pepper Goldhill
5 3.71 3.77 3.98 3.96
10 3.59 3.79 3.36 3.80
20 3.69 3.81 3.96 3.83
JPEG 30 3.81 3.85 3.79 3.81
50 2.56 3.59 4.17 3.82
80 3.03 4.40 4.58 2.93
90 3.45 3.44 4.41 3.02
3×3 4.21 3.34 2.61 3.78
Median filter
5×5 4.35 4.01 3.72 4.14
3×3 0.00 0.00 0.00 0.00
Gaussian filter 5×5 0.00 0.00 0.00 0.00
7×7 0.00 0.00 0.00 0.00
Wiener filter 3×3 3.68 3.64 4.56 4.82
Sharpening - 2.41 4.12 4.64 4.00
0.01 3.83 3.68 4.80 3.45
0.02 4.94 3.78 4.73 3.72
Gaussian noise
0.03 4.84 4.50 4.94 3.36
0.05 4.85 4.07 4.87 3.58
0.01 3.82 3.63 4.37 2.38
0.02 2.73 3.53 4.67 3.54
0.05 3.58 3.83 3.68 3.49
Salt & pepper noise
0.06 3.45 3.73 3.98 3.58
0.07 3.58 2.96 4.11 4.15
0.08 3.93 3.20 3.55 3.92
-5 4.34 4.36 4.44 2.05
-2 3.04 2.03 3.33 1.60
-1 3.50 2.61 2.77 2.56
-0.5 3.61 2.18 2.75 2.98
Rotation
1 3.66 1.74 2.25 3.34
0.5 3.36 2.18 3.21 2.33
2 2.92 2.03 3.26 4.00
5 4.44 2.74 4.47 3.35
0.2 4.63 5.34 4.78 5.80
Scaling
0.5 5.23 6.23 7.01 6.90
JPEG 50 + Med.filter (3×3) - 4.29 4.43 4.71 4.71
JPEG 50 +Gaussian noise (0.01) - 4.48 2.61 3.22 2.93
JPEG 50 +scaling (0.2) - 6.25 4.36 6.66 5.41
69
0.95
0.9
NC values
0.7
T R D
Table 3.6 Comparison of global authentication rate for Lena image with
Lie et al (2006)
Ranjbar et al
Attacks Proposed method
(2013)
JPEG compression 2.56 7.49
(QF = 50)
Median filter (3 × 3) 4.21 13.37
Salt & pepper noise (20%) 2.73 11.71
Averaging filter (3 × 3) 3.02 3.41
Gaussian noise (10%) 2.81 11.71
Rotation (0.50) 3.36 -
Scaling(50%) 4.63 0
Cropping(25%) 4.01 0
Sharpening 2.41 0
75
The proposed method attains high NC values for all the attacks
compared as shown in Figure 3.10. The method in Ranjbar et al (2013) is not
robust against rotation and median filter.
1
0.95
0.9
0.85
NC values
0.8
Ranjbar et al (2013)
0.75
0.7 Proposed scheme
0.65
0.6
0.55
0.5
3.6 SUMMARY
filter banks do not do down samplings, it causes the contourlet transform not
to have translational invariance (Shunqing et al 2012). This is why our
scheme is less robust to scaling attack. The comparison of the proposed
method with other existing schemes shows improved performance of the
scheme in terms of transparency and robustness. The person who owns a valid
secret key and a user-id only can claim as the rightful owner of the image.
This method can be efficiently applied for copyright protection and ownership
verification of digital images.