Example 7.2 Watermark distribution

A set of test results of watermark distribution and invisibility is given in Figure 7.8. The watermark used is a random sequence with Gaussian distribution N(0, 1) and length M = 1,000. Figure 7.8(a) is an original Lena image, and Figure 7.8(b) is the watermarked image (PSNR = 38.52 dB). Figure 7.8(c) is the absolute difference image (it has been enhanced to increase contrast to make the difference more visible).

Two points can be remarked from Figure 7.8:

(1)From the visual perception point of view, it is hardly to see the difference between these two images (one before embedding and one after embedding), which shows that the algorithm has a good invisibility. In fact, the normalized correlation coefficient of these two images is 0.999, which means that the correlation between the two images is very high, which is consistent with the subjective feeling that these two images are quite similar.

Figure 7.8: Effect of watermark distribution and invisibility.

(2)From the difference image, it is seen that the watermark embedding intensity is larger in high texture region, low brightness region and high brightness region, but the watermark embedding intensity is relatively small in smooth region and the middle brightness region. In other words, the watermark embedding strength has the adaptive adjustment performance.

7.4Performance Evaluation of Watermarking

The determination and evaluation of the performance of the watermarking is closely related to the characteristics and indexes of the watermark. Below several measures for the degree of distortion are first introduced, and some benchmark methods for performance evaluation are presented next. Finally, the watermark performance testing and evaluation are discussed by taking the performance verification of the watermarking algorithm described in the previous sections as examples.

7.4.1Distortion Metrics

Watermark invisibility is a subjective indicator, more susceptible to the observer’s experience and status, the test environment and conditions, and other factors. Some objective indicators (distortion metrics) can also be used. If the original image is f(x, y), the watermark image is g(x, y), the dimensions of these images are N × N, then different distortion metrics can be defined. Commonly used difference distortion metrics include the following:.

(1)Lp Norm

DLp={1N2x=0N1y=0N1|g(x,y)f(x,y)|p}1/p(7.24)

When p = 1, it gives the mean absolute difference, when p = 2, it gives the root-mean-square error.

(2)Laplace Mean Square Error

D1mse=x=0N1y=0N1[2g(x,y)2f(x,y)]2x=0N1y=0N1[2f(x,y)]2(7.25)

Commonly used correlation distortion metrics include the following two.

(1)Normalized Cross-Correlation

Cncc=x=0N1y=0N1g(x,y)f(x,y)x=0N1y=0N1f2(x,y)(7.26)

(2)Correlation Quality

Ccq=x=0N1y=0N1g(x,y)f(x,y)x=0N1y=0N1f(x,y)(7.27)

7.4.2Benchmarking and Attack

In addition to the design of watermarking technology, the development and utilization of the evaluation and benchmarking of the watermarking technology have also been a lot of research.

7.4.2.1Benchmarking Methods

There are many ways to determine the performance of the watermarking with baseline measurement (benchmarking). In general, the robustness of the watermarking is related to the visibility and payload of the watermarking. For fair evaluation of different watermarking methods, it is possible to first determine certain image data, in which watermark is embedded as much as possible while it does not very much affect the visual quality. Then, the embedded watermark data are processed or attacked, so the performance of the watermarking methods can be estimated by measuring the error ratio. It is seen that the benchmarking for measuring watermarking performance will be related to the selection of the payload, the visual quality measurement process as well the procedure of attack. Here are two typical benchmarking methods.

Table 7.1: Processing methods and associated parameters for judging robustness.

#Process operationParameter
1JPEG compressionQuality factor
2BlurringMask size
3NoiseNoise levels
4Gamma correctionGamma index
5Pixel exchangeMask size
6Mosaic (filtering)Mask size
7Median filteringMask size
8Histogram equalization 

Robustness Benchmarking In this benchmarking (Fridrich and Miroslav, 1999), the payload is fixed at 1 bit or 60 bits; visual quality measure is adopted from spatial mask model (Girod, 1989). This model is based on the human visual system, and it accurately describes the visual distortion/degradation/artifact (artefact) produced in edge regions and smooth regions. The strength of the watermark is adjusted so that only less than 1% of the pixels can be seen when these pixels have been changed, based on the model above. The selected processing methods and related parameters are listed in Table 7.1; the visual distortion ratio is a function of the relevant process parameters.

Perception Benchmarking In this benchmarking (Kutter and Petitcolas, 1999), the effective payload is fixed to 80 bits; the visual quality metric used is the distortion metric (Branden and Farrell, 1996). This distortion metric considers the contrast sensitivity and the mask characteristic of the human vision system and counts the points over the visual threshold (JND).

7.4.2.2Outside Interferences

There are a variety of outside interferences for images. They can be divided into two categories from the perspective of the robustness of the watermark. The first category consists of the conventional means of image processing (not specifically for watermark), such as sampling, quantization, D/A and A/D conversion, scanning, low-pass filtering, geometric correction, lossy compression, and printing. The ability of image watermarking against these outside interferences is more commonly called the robustness. The second category refers to malicious attack mode (specifically for watermarking), such as illegal detection and decoding of the watermark, resampling, cropping, special displacement, and the scale changes. The ability of watermarking to withstand these outside attacks is commonly measured by anti-attack aptitude.

The attacks to watermark refers to various unauthorized operations, they are often divided into three types:

(1)Detection: For example, a user of watermark product tries to detect a watermark that only the owner has the right to do, which is also called passive attacks.

(2)Embedding: For example, a user of watermark product tries to embed a watermark that only the owner has the right to do, which is also called forgery attack.

(3)Deletion: For example, a user of watermark product tries to delete a watermark that only the owner has the right to do, which is also called removing attack that can be further divided into eliminating attack and masking attack.

Several types of the above attacks may also be used in combination. For example, first to remove existing watermark from products and then to re-embed other watermarks needed, which is also called changing attack.

The so-called watermark attack analysis is to design methods to attack the existing watermarking system, in order to test its robustness. The purpose of the attack is to make the corresponding watermarking system from correctly restoring watermark or make the detecting tool from detecting the presence of the watermark. By analyzing the weaknesses and vulnerability of system, it is possible to improve the design of watermarking systems.

There is a simulation tool called StirMark, which is a watermark attack software. People can use it to evaluate the different anti-attack capability of watermarking algorithms, by inspecting whether the watermark detector can extract or detect watermarks from watermark carrier that has suffered attacks. StirMark can simulate many kinds of processing operations and various means of attack, such as geometric distortion (stretching, shear, rotate, etc.), nonlinear A/D and D/A conversion, print out, scan, and resampling attacks. In addition, StirMark can also combine a variety of processing operations and means of attack to form a new kind of attack.

7.4.3Examples of Watermark Performance Test

In the following, some performance test processes and results for the watermarking algorithms presented in the above two sections are given.

7.4.3.1Meaningless Watermarking in DCT Domain

Two tests using Lena image are carried out.

Robustness Test Several common image processing operations and interferences are tested with the watermarking algorithm presented in Section 7.2.1. Figure 7.9 shows several results obtained for watermarked Lena image. Figure 7.9(a) is the result of mean filtering with mask of size 5 × 5 (PSNR = 21.5 dB). Figure 7.9(b) is the result of 2: 1 subsampling in both the horizontal and vertical directions (PSNR = 20.8 dB). Figure 7.9(c) is the result of compression by retaining only the first four DCT coefficients (PSNR = 19.4 dB). Figure 7.9(d) is the result of adding white Gaussian noise (PSNR = 11.9 dB, the effect of noise is quite obvious). Under these four situations, the images all have exceedingly distortion, but the watermark can still be accurately detected out.

Figure 7.9: Verify examples for image processing operations on watermark.

Uniqueness Test Given a random sequence as the watermark, other sequences generated by the same probability distribution could also be taken as watermarks. According to this idea, 10,000 random sequences are generated from a Gaussian distribution N(0, 1), taking one of them as a (real) watermark and all others as fake watermarks for comparison. The test results of mean filtering, subsampling, and compression processing are shown in Table 7.2. Since the differences between the real watermark and the results obtained with fake watermark are very significant (correlation values are quite distinct), the real watermark and the fake watermark can easily be distinguished.

7.4.3.2Meaningful Watermarking in DCT Domain

In addition to the use of Lena image, the performance test of the meaningful watermarking algorithm presented in Section 7.2.2 also uses two other images: the Flower and the Person, respectively, as shown in Figures 7.10(a) and (b).

Three tests are carried out.

Robustness Test against Mean Filtering A sequence of eight symbols is embedded in each test image. Masks of 3 × 3, 5 × 7 are used, respectively. Figure 7.11 gives a few of the filtering results. Figures 7.11(a) and (b) are for Lena image with masks of 5 × 5 and 7 × 7, respectively. Figures 7.11(c) and (d) are for Flower image with masks of 5 × 7, respectively.

Table 7.2: Test results on the uniqueness of watermark.

Figure 7.10: Two other test images.

Figure 7.11: Test results after mean filtering.

Detection of meaningful watermark needs not only to extract all symbols but also to detect correctly the position of each symbol. Table 7.3 gives the corresponding test results, the number of correct symbols (# Correct) here refers to both the correct symbols and the correct position. In each case, the peak signal-to-noise ratio (PSNR) of watermarked images after low-pass filtering is also provided to give an indication of the quality of the image.

It is seen from Figure 7.11 and Table 7.3 that with the increase in the size of the mask, the image becomes more blurred, and the ability of watermark to resist mean filtering drops, too. Since the details of Lena image and Flower image are less than the details of Person image, so after filtering with 5 × 5 mask, all watermark symbols can still be detected, but at this time the watermark symbols embedded in the Person image could not be correctly detected.

Table 7.3: Robustness test results of mean filtering.

Robustness Test against Subsampling A sequence of eight symbols is embedded in each test image. Three kinds of subsampling rate (both in the horizontal and vertical directions) are considered here: 1:2 subsampling, 1:4 subsampling, and 1:8 subsampling. Figure 7.12 gives the results of the several subsampling process, in which Figures 7.12(a) and (b) are the partial view of Lena image after 1:2 and 1:4 subsampling, respectively; Figures 7.12(c) and (d) are the partial view of Person image after 1:2 and 1:4 subsampling, respectively. Comparing two groups of images, the subsampling has more influence on Person image than on Lena image.

Table 7.4 lists the corresponding test results. In various situations, the peak signal-to-noise ratio (PSNR) of the watermarked images after subsample is also listed in order to give an indication of the quality of the image. Compared to the cases of mean filtering, the subsampling leads to a more serious distortion of the image.

Robustness Test against JPEG Compression In this experiment, the sequence size of embedded symbols varies from 1 to 128, for each test images. Table 7.5 gives the corresponding test results. Values given in the table is the lowest value of an image PSNR at which the entire sequence of watermark symbols can be correctly detected. As can be seen from Table 7.5, the length of sequence of symbols embedded is related with the image PSNR. Since the dimension of the matched filter is automatically adjusted, so for the sequence of symbols of different lengths, the noise level that can be tolerated is also different.

Figure 7.12: Several result images after subsampling.

Table 7.4: Robustness test results of sub-sampling.

Table 7.5: Robustness test results of JPEG compression (dB).

Table 7.6: The resistance of watermark to some image processing and attacks.

Processing/AttacksPSNR/dBNormalized correlation coefficient CN
Mean filtering19.350.908
Gaussian noise16.780.537
JPEG compression (compression ratio 37:1)27.150.299
Median filtering32.000.689
Sharpening34.190.969
2 × 2 Mosaic29.620.531
7.4.3.3Watermarking in DWT Domain

The robustness test for the wavelet domain watermarking algorithm described in Section 7.3 still uses Lena image. The resistance of watermark embedded to some image processing processes and attacks is shown in Table 7.6, if the decision threshold is set to 0.2, all the symbols of watermark can be detected correctly according to the normalized correlation coefficients.

7.5Information Hiding

Information hiding is a relatively broad concept, generally refers to embed some specific information intentionally hidden into a carrier, in order to achieve the purpose of a secret.

7.5.1Watermarking and Information Hiding

Information hiding can be secret or non-secret, depending on whether the existence of information is confidential or not confidential. In addition, information hiding can be the type of watermark or the type of non-watermark, depending on whether these specific information are correlated with or not correlated with the carrier.

Table 7.7: The classification of information hiding technology.

 Correlated with carrierNo correlation with the carrier
Hiding existence of information(1) Secret watermark(3) Secret communication
Knowing existence of information(2) Non-secret watermark(4) Secret embedding communications

According to the above discussion, the information hiding technology can be divided into four categories, as shown in Table 7.7 (Cox et al., 2002):

7.5.2Images Hiding Based on Iterative Blending

Image hiding can be viewed as a special kind of steganography. It intends to hide an image into the carrier image for transmission. In actual utilization, the carrier image is generally a common image that can be passed without public suspicion. In the following, a way to hide image is presented.

7.5.2.1Image Blending

Let carrier image be f(x, y), the hidden image be s(x, y). Suppose α is a real number satisfying 0 ≤ α ≤ 1, then the image

b(x,y)=αf(x,y)+(1α)s(x,y)(7.28)

is the result of blending images f(x, y) and s(x, y) with parameter α, which is called a trivial blending when α is 0 or 1.

A blending example of two images is shown in Figure 7.13, in which Figure 7.13(a) is the carrier image (Lena image) and Figure 7.13(b) is the hidden image (Girl image). Taking α = 0.5, the blending image in as Figure 7.13(c).

Figure 7.13: An example of image blending.

From the perspective of camouflage, the image obtained by blending should not be different in the visual sense with carrier image. According to the definition of the image blending, when the parameter α is close to 1, the image b(x, y) will be close to f(x, y); when the parameter α is close to 0, the image b(x, y) will be close to s(x, y). This allows the utilization of human visual characteristics for better hiding one image into another image. Hidden images can be restored by the following formula:

s(x,y)=b(x,y)αf(x,y)1α(7.29)

For digital images, some errors in rounding will be produced during the calculation and recovery process, and this induces the drop of quality of restored image. This error is dependent on the two images themselves and the blending parameter. When two images were given, this error is only the function of parameter α . This error can be measured by the root-mean-square error between two images. In Figure 7.14, the function curves of rounding error versus the parameter α(left for blended image, right for restored image) are given, where Figures 7.13(a) and (b) are taken as carrier image and hidden image, respectively (Zhang et al., 2003).

It is seen from Figure 7.14 that the more the parameter α approaches 1, the better the effect of image hiding, but the worse of the quality of restored image. On the contrary, if the better quality of restored image is required, then the parameter α could not approach 1; however, the effect of image hiding would not be good. Therefore, there must be a best blending parameter value that can make the sum of errors from blended image and from restored image to be a minimum, this is shown by the valley in the curve of Figure 7.15.

In summary, the general principles of image hiding are selecting first the carrier image that resemble the image to be hidden as close as possible, then selecting the blending parameter as small as possible in the permitted visual range. In this way, the quality of the restored image could be ensured.

7.5.2.2Iterative Blending with Single Image

Extending the above procedure, it is possible to obtain the iterative blending of images by using several blending parameters with a number of times.

Figure 7.14: Relationship between the qualities of blended image and restored image with different blending parameters.

Figure 7.15: The curve of best blending.

Suppose {αl|.αl1,i=1,2,,N} are N given real numbers, blending image f(x, y) and image s(x, y) with parameter α1 gives b1(x, y) = α1f(x, y) + (1 – α1)s(x, y), blending image f(x, y) and image b1(x, y) with parameter α2 gives b2(x, y) = α2f(x, y) + (1 – α2)b1(x, y), . . ., continuing this procedure can obtain bN(x, y) = αNf(x, y) + (1 – αN)bN–1(x, y), and image bN(x, y) can be called N-fold iterative blend image with respect to {αi, i = 1, ..., N}. It can be proved that in no-trivial cases, image bN(x, y) will monotonically be converged to the carrier image f(x, y):

limNbN(x,y)=f(x,y)(7.30)

Figure 7.16 presents some examples of using the above iterative algorithm for image hiding and restoration, in which the images of Figures 7.13(a) and (b) are taken as carrier image and hiding image, respectively. In Figure 7.16, the up line images are blending results with 1, 2, and 3 iterations (the blending parameters are 0.8, 0.7, and 0.6), respectively; the bottom line images are the hiding images restored from corresponding blend images. The related parameters and error data are listed in Table 7.8, with RMSE stands for root-mean-square error.

7.5.2.3Iterative Blending with Multiple Images

The above algorithm of image blending and algorithm of iterative blending with single image embedding both a secret image in only one carrier image. If the attacker does intercept the carrier image and blend image, and does have some doubt, then the attacker would restore the secret image with the help of the original carrier image by subtraction. The security of such a hiding system is completely dependent on only one carrier image, so it is relatively fragile. In order to solve this problem, the idea of image blending can be extended to use multiple blending parameters and also multiple carrier images to hide a single secret image, which is called the iterative blending with multiple images.

Figure 7.16: Experiment results of iterative blending with one carrier image.

Table 7.8: Parameters and error data of iterative blending with single image.

Let fi(x, y), i = 1, 2, . . ., N be a group of carrier images, s(x, y) be a secret image, {αi|0 ≤ αl1,i=1,2,,N} be N given real numbers. Blending image f1(x, y) and image s(x, y) with the parameter α1 gives b1(x, y) = α1f1(x, y) + (1 – α1)s(x, y), Blending image f2(x, y) and image b1(x, y) with the parameter α2 gives b2(x, y) = α2f2(x, y) + (1 – α2)b1(x, y), continuing this procedure can obtain bN(x, y) = αNfN(x, y) + (1 – αN)bN–1(x, y). The image bN(x, y) is called N-fold iterative blend image with respect to parameters {αi, i = 1, . . ., N} and images {fi(x, y), i = 1, . . ., N}.

According to the definition of iterative blending with multiple images, it is possible to obtain an image hiding scheme, which blend a secret image into multiple carrier images iteratively with the help of masking properties of human visual system. To restore such a secret image, it is required to use N blend images and N blend parameters, and to know the blend order of these images. Therefore, this scheme of iterative blending with multiple images is a quite safe one.

Figure 7.17: An example of iterative blending with multiple carrier images.

One example of iterative blending with multiple images is shown in Figure 7.17. In the hiding process, the image Couple in Figure 7.17(c) is hided in the image Girl in Figure 7.17(b) with blend parameter α2 = 0.9, the result image is further hided in the image Lena in Figure 7.17(a) with blend parameter α1 = 0.85. In this example, Figure 7.17(a) is the open image, Figure 7.17(b) is the image with intermediate result, and Figure 7.17(c) is the hiding image.

7.6Problems and Questions

7-1What are the differences between the problems encountered in the embedding and extraction of watermarks?

7-2*What are the other properties/features of the watermark, except those that have been introduced in the text? Give a few examples.

7-3If dividing the brightness of the image block into three levels: low brightness, medium brightness, high brightness; and dividing the texture of the image block also into three types: simple texture, medium texture, complex texture, then there are nine combinations of them. Please make an analysis on the influence of watermark embedding in these nine cases from the perspective of invisibility.

7-4*If you want to embed “TSINGHUA UNIVERSITY” four times in a 256 by 256 image by using the method described in Section 7.2.2, how many coefficients from each image block should be used at least?

7-5It is required to provide one example each from the everyday life for the three types of human visual masking features described in Section 7.3.1.

7-6Please make an analysis on the characteristics (such as advantages, disadvantages) of each distortion measure described in Section 7.4.1. What are the suitable application areas for each of these measures?

7-7Select an image, and make lossy JPEG compression on it. With the original image and compressed images, calculate the distortion measures introduced in Section 7.4.1. Draw the curve of each distortion measure value as the function of the compression rate.

7-8What is the difference between a malicious attack and a conventional image processing operation on a watermark? Give some examples for each of them.

7-9Collect and create a list of malicious attacks on watermarks to discuss how they affect the presence and detection of watermarks?

7-10After adding a certain amount of watermark information to an image, the distortion of the watermarked image can be measured by using the distortion measures described in Section 7.4.1. Compare these measures according to the (relative) values of these distortion measure results to rank them. Compare further these measures with the subjective sensation.

7-11Many watermarking applications can also be accomplished by using other techniques, so what are the advantages of watermarking over other technologies?

7-12What is the relationship between image watermarking and image coding? What are their similarity and difference?

7.7Further Reading

1.Principles and Characteristics

A comprehensive description of watermarking techniques is also available in Cox et al. (2002).

Some discussions on the future of watermarking can be found in Barni et al. (2003a, 2003b).

2.Image Watermarking in DCT Domain

More introduction to various algorithms can be found in Shih (2013).

3.Image Watermarking in DWT Domain

One of the features of DWT domain image watermarking is the easy integration of human visual characteristics (Barni et al., 2001).

4.Performance Evaluation of Watermarking

There are publicly available tools to test the robustness of image watermarking techniques. For example, there is a tool available for JPEG format images called Unzign (1997).

5.Information Hiding

Although there are certain differences between steganography and watermarking, their components complement each other more than they compete (Kutter and Hartung, 2000).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.123.120