Combined blur and RST invariant digital image ... - Semantic Scholar

2 downloads 6839 Views 351KB Size Report
Combined blur and RST invariant digital image watermarking using ..... signature images and their NC value after rotation distortion. (shown in Table.1), one can ...
2008 International Conference on Signals, Circuits and Systems

Combined blur and RST invariant digital image watermarking using complex moment invariants Hanjie Ji, Jie Zhu, Hongqing Zhu Department of Electronics & Communication Engineering, East China University of Science and Technology Shanghai, 200237 China Abstract-In this paper, we present a watermarking system

transform. However, this method is based on the DFT of the

including hiding, detecting and extracting a confidential

image which is highly sensitive to cropping attack. Image

two-dimension binary watermark, such as a school logo, into a

normalization, provides a convenient way for dealing with

still image, which is robust to geometric distortions and blurring.

geometric attacks; the key idea is to geometrically transform

Watermark embedding is performed in the DCT domain of the

the image into a standard form [3]. In [4], the author had

original image. The watermark detection is as simple as

proposed an image data hiding approach. By quantizing the

computing a set of complex moment invariants to illuminate the

magnitudes of Pseudo-Zernike moments of images, a multibit

robustness

image

watermark can be embedded imperceptibly at low error rates

manipulations. In the extraction scheme, we first estimate the

even without using error control codes, capable of combating

geometric distortion factors of the geometrically attacked

geometric distortions. In [5], a moment invariant-based

watermarked

the

watermark was designed to obtain robustness under image

geometrically attacked image can be transformed back to its

transformations, but the watermark insertion leads to an

original

lost

appreciable change of image contrast, making the image

synchronization for watermark extraction. The watermark is

unpleasantly brighter. We think this method is hard to

then extracted from the corrected image.

implement. All of these methods fail to image blurring

problem

image.

position,

size

under

With

and

general

these

geometric

estimated

shape

to

factors,

recover

the

manipulation. Keywords:

watermarking;

geometric

attack;

Some of common geometrical attacks on images are RST.

blurring;

In this paper, we propose a watermarking scheme in the

complex moment invariants; DCT;

invariant domain using complex moment invariant introduced by [6]. This class of invariants is robust to RST transform as

I. INTRODUCTION

well as blurring. Hence, they can be used to detect the watermark to address the robustness problem. In the

With the ever-growing expansion of digital multimedia and the Internet, the problem of ownership protection of digital

extraction

scheme,

the

watermark

synchronization

is

information has become increasingly important. Thus, digital

implemented by estimating the geometric distortion factors

watermarking was proposed as a viable solution to the need of

using geometric central moments. With these estimated

copyright protection and authentication of multimedia data in

factors, the geometrically transformed image can be

a networked environment. Geometric attacks are among the

transformed back to its original position; size and shape to

most challenging problems in present day watermarking [1].

recover the lost synchronize for watermark extraction. The

Such attacks are very simple to implement yet they can defeat

watermark is then extracted from the corrected image.

most of the existing watermarking algorithms without causing serious perceptual image distortion. Some attempts have been

II. METHODS

made to solve this problem. A method was presented in [2] in A. Complex Moment Invariant

which the watermark is inserted in rotation, scale and translation invariant parameters based on the Fourier-Mellin

978-1-4244-2628-7/08/$25.00 ©2008 IEEE

This study chooses a set of moment invariants proposed by

-1-

2008 International Conference on Signals, Circuits and Systems

invariants which are functions of central moments up to 3rd

Liu et. al [6]. Here, we only consider six simplest moment order. And the relationships between complex moments and central moments are given.

I1 = C21C12 = c 2 (1) + s 2 (1)

Original Image

I 2 = Re ( C20 C122 ) = c ( 2 ) ª¬c 2 (1) − s 2 (1) º¼ + 2 s ( 2 ) c (1) s (1) I 3 = Im ( C20 C

2 12

) = −s ( 2 ) ª¬c (1) − s (1)º¼ + 2s ( 2 ) c (1) s (1) 2

Logo

2

I 4 = Re ( C30 C123 )

Zig-Zag Scan

DCT

Pseudo-Radom Generation

(1)

= − s ( 3) c (1) ª¬c 2 (1) − 3s 2 (1) º¼ + c ( 3) s (1) ª¬3c 2 (1) − s 2 (1) º¼

× ¢

+

+ +

Key

Inverse Zig-Zag Scan

I 5 = Im ( C30 C123 ) = c ( 3) c (1) ª¬c2 (1) − 3s 2 (1) º¼ + s ( 3) s (1) ª¬3c 2 (1) − s 2 (1) º¼

Inverse DCT

I 6 = C02 C20 = c ( 2 ) + s ( 2 ) 2

Watermarked Image

2

Fig.1. the scheme of watermarking embedding

Here 52 ­ c (1) = ( u30 + u12 ) u00 ° 52 ° s (1) = ( u03 + u21 ) u00 2 °° c(2) = ( u20 − u02 ) u00 ® 2 s ( 2 ) = 2u11 u00 ° 52 ° c(3) = ( u30 − 3u12 ) u00 ° 52 °¯ s ( 3) = ( 3u21 − u03 ) u00

First of all, the m×n binary logo that needs embedding is scanned and converted to a bit sequence of watermark L. L = {li ,1 ≤ i ≤ m × n}, li ∈ {0,1} (5)

(2)

The pseudo-random sequence P is generated using a secret key for the correct extraction of the watermark. The length of the pseudo-random sequence is equal to the length of bit sequence of watermark. P = { pi ,1 ≤ i ≤ m × n},

and the complex moment C (pqf ) of (p+q)-order of the image function f ( x, y ) is defined as 1

C (pqf ) =

1+

(f)º ªu00 ¬ ¼

p+q 2

ª º p q « ³³ ( x + jy ) ( x − jy ) f ( x, y ) dxdy » «¬ R2 »¼

u pq = ³

+∞

−∞

_

³

+∞

computed and scanned by the Zig-Zag scan. The 2-D DCT

(3)

coefficient is recorded into 1-D vector T after Zig-Zag scan which re-order the DCT coefficient from low frequency to

−∞

high frequency. On consideration of the balance between the robustness and visual transparency, the watermark is inserted

_

( x − x) p ( y − y ) q f ( x, y )dxdy

(6)

The 2-D DCT form of an M×N original image I is

where upq is central moments as follows: _

pi ∈ {−1,1}

(4)

into original image at mid-frequency X. T = {ti ,1 ≤ i ≤ M × N}

_

(7)

Where x , y is the centroid of the image. In the mid-frequency ranging from (X+1)th to (X+m™n)th of B. Watermark Embedding

the vector T, the DCT coefficient is reconstructed according to

The watermarking system proposed in this article includes

following rules.

the embedding of the watermarking, detection and extraction

ti' = ti + α ⋅ pi ⋅ li

of watermarking. Fig.1. depicts an overview of the watermark

i = 1, 2,.....m × n ,

(8)

where α is a scaling factor to determine the strength of the

embedding method.

-2-

2008 International Conference on Signals, Circuits and Systems

watermark, which controls the trade-off between the transparency and robustness of the watermark. After being reconstructed, the DCT coefficient is re-ordered by the inverse Zig-Zag scan into 2-D vector and then transformed by the inverse DCT to obtain the watermarked image I ' .

C. Watermark Detection and Extraction Watermark detection and extraction is based on the comparison of invariants feature points of images in the feature space. How the watermark detector works, as shown in Fig.2, will be described in detail. The watermark feature space as the 6-D space spanned by the six complex moment invariants I1, I2,…,I6,. In this paper, we use the distance between two points in the space to measure the closeness of the two corresponding images. The distance between two points is defined as follows. °­ I i ( f ) − I i ( g ) °½ d ( f , g ) = max ® ¾ i ¯° max( I i ( f ) , I i ( g ) ) ¿°

(9)

Where I i ( f ) and I i ( g ) are the ith moment invariants of the image f and image g respectively. If the distance d < dth Fig.3. Block diagram of watermark extraction

(dth is threshold), the watermark is present, otherwise is not.

The watermark extraction part is illustrated in Fig.3. Firstly, the extractor should estimate RST factors. Then, the corrupted watermarked image can be restored back to its original size and location. That is, we can recover synchronization of watermark embedding and extracting processing. Once the attacked image is synchronized with the original image, we can extract the watermark in its DCT domain. 1. Rotation angle estimation Using the major principal axis method [7], the principal axis moments are obtained by rotation the axis of the central moments until u’11 is zero. This rotation angle θ is 1 2

§

2u11 · ¸                           (10) © u20 − u02 ¹

θ = − tan −1 ¨

2. Scaling factor estimation If an image is transformed with unequal scale factors k1, k2 along x and y axes, respectively. The scaling transformed moments m00’ and m10’can be obtained as follows:

Fig. 2. The process of watermark detection

' m00 = k1k2 m00 ,  m10' = k12 k2 m10                      (11)

-3-

2008 International Conference on Signals, Circuits and Systems

thus, the scale factors k1, k2 is

k1 =

' 10

(2) Attacks of Watermark Image

' 2 00 10 2 ' 00 10

We applied various attacks to the watermarked images such

m00 m m m ,    k2 =                       (12) ' m00 m10 m m

as rotation, scaling, translation and blurring. Fig.5 shows the

where mpq is moment of (p+q)th-order defined as follows:  m pq = ³³ x y f ( x, y )dxdy p

q

watermarked images after attacking.

(13)

R2

3. Translation factor estimation Due to the fact that image centroid ( x, y ) moves with the image under transform, the translation factor c and d along xand y-axis is: 

(a)

(b)

(c)

c = x − x '   d = y − y '                             (14) Here, ( x ' , y ' ) is coordinate of transformed image. 

(d)

III. EXPERIMENTAL RESULT

(e)

Fig.5 Watermarked images after RST distortion and blurring, (a) rotation of 45 degree,(b)scale(size193×193), (c) scale

In order to test the robustness of the proposed watermarking scheme, we applied various common attacks

(size320×320),(d) translation 40 pixels in x-axis and 60 pixels

such as rotation, scaling, translation and blurring to some

in y-axis, (e) blurring

images. In this paper, the experimental results are obtained (3) Watermark Detection

using the standard image ‘Lena’ shown in Fig.4 (a), a signature image, the logo of East China University of Science

The method of watermark detection was tested. We

and Technology, is shown in Fig.4 (b). The original image was

calculated the distance of feature space between watermarked

signed with factor α = 20 , X=35000, M×N=65535, m × n =

image and the various attacked watermarked image. The

9216, Key=96.

calculated distances d and dth are shown in Table 1. The results show that the proposed method can effectively detect the watermark under the various attacks, such as RST and

(1) Watermark Embedding

blurring.

First, the watermark embedding method was tested. Fig.4(c) shows the watermarked image. The Peak Signal to Noise Ratio (PSNR) of the watermarked image is 34.5 dB.

Table 1

Therefore, the watermarked image meets the need of

Experimental results of distance d for detection after RST

perceptual transparency.

attacking and blurring.

(a)

(b)

(c)

Fig.4 Original image and binary signature image, (a) original image Lena (size 256×256), (b)logo image(size 96×96 ), (c) watermarked image(size 256×256, PSNR=34.5 dB)

-4-

Attacks

d

dth

Rotate 10degree

7.8331E-2

0.1

Rotate 45degree

3.4027E-2

0.1

Rotate 90degree

0

0.1

Scaling(98%)

8.4537E-2

0.1

Scaling(200%)

7.3256E-2

0.1

Scaling(400%)

0

0.1

Translate [20,0]

0

0.1

Translate[ 20,46]

0

0.1

2008 International Conference on Signals, Circuits and Systems

Translate [-60, -50]

0

0.1

impact on the quality of extracted watermark than scaling to

Blurring(radius 3)

1.87E-12

0.1

small size does. Finally, the extracted watermarks after

Blurring(radius 5)

4.16E-12

0.1

translation are shown in Fig. 9. From Fig. 9 and NC value of

Blurring(radius 10)

1.54E-11

0.1

extracted watermarks after translation distortion (shown in Talbe.1.), it is found that the effect on quality of extracted watermark

Here, we take scaling attack as an example to show the

after

translation

attacks

is

comparatively

detector response of 1000 watermarks generated by different

unobvious according to our extraction method. Therefore, the

keys. In Fig. 6, even the tested watermarked image is attacked

proposed watermarking extraction method performs well

by scaling distortion, the distance of correct key (#96) is the only one that is less than the threshold distance dth (dash line),

under translation attacking.

which means that the watermark is detected.

(a)

(b)

(c)

Fig. 7. The extracted signature image after rotation distortion, (a) rotate 10 degree, (b) rotate 45 degree, (c) rotate 90 degree

(a)

(b)

(c)

Fig.8. The extracted signature image after scaling distortion,

Fig.6. Detector response of the watermarked image to 1000

(a) scale(230×256), (b) scale(230×280), (c) scale(512×512)

randomly generated watermarks. (4) Watermark Extraction Once the correct key and the original image are possessed, the signature image can be obtained by the proposed watermark extraction method even if the watermarked image has been attacked by rotation, scaling and translation. In the

(a)

following experiments, we tested the effectiveness of

(b)

(c)

Fig.9. The extracted signature image after translation

proposed extraction method. Fig. 7 illustrates the extracted

distortion, (a) translate 20 pixels in x-axis, (b) translate 20

watermark after several rotation attacks. From the extracted

pixels in x-axis and 46 pixels in y-axis, (c) translate -60 pixels

signature images and their NC value after rotation distortion

in x-axis and -50 pixels in y-axis

(shown in Table.1), one can see that the rotation of 90 degree has the least effect on the quality of extracted watermark. In

Table.1. The NC value of extracted signature after

Fig. 8, the extracted watermarks of scaling attacks are shown.

watermarked image is attacked by rotation, scaling and

From the extracted watermark and NC value of extracted

translation

signature image after scale distortion ( shown in Table 1), one can see that scaling the image to large size has much less

-5-

2008 International Conference on Signals, Circuits and Systems

[4] Y. Xin and S. Liao and M. Pawlak, “Circularly Orthogonal

Attacks

NC

Rotate 10degree

0.91042

Moments

Rotate 45degree

0.85483

Watermarking,” Pattern Recognition, Vol. 40, Issue 12, PP

Rotate 90degree

0.98999

3740-3752, 2007

scale(230×256)

0.95126

scale(256×280)

1.00000

scale(256×512)

1.00000

Translate [20,0]

1.00000

Translate[ 20,46]

1.00000

Translate [-60, -50]

1.00000

for

Geometrically

Robust

Image

[5] M. Alghoniemy and A. H. Tewfik, “Image Watermarking by Moment Inviarants,” IEEE Conference on Image Processing, pp. 73-76, 2000 [6] J. Liu and T. Zhang, “Recognition of the blurred image by complex moment invariants,” Pattern Recognition Letters, 26, pp.1128-1138, 2005 [7] Reeers, A. P., Prokop, R. P. Andrews, S.E., Kuhl, F. P.: Three-dimensional shape analysis using moments and

The results described above show that our watermarking

Fourier descriptors. IEEE Trans. Pattern Anal. Mach. Intell.

method is robust to various kinds of geometrical distortions

10, pp. 937-943, 1988

such as rotation, scaling, translation and blurring. The method can successfully detect the existence of the watermark. With the correct key and the original image, it is also able to extract the watermark after RST distortion, protecting the copyright of the owner. IV. CONCLUSION This study had proposed a watermarking scheme based on the 2-D DCT and use complex moment invariants to detect and extract the watermark. The proposed scheme, which is robust to geometric transform and blurring, can be used for hiding 2-D binary watermark into digital image to identify the copyright. The experimental results show that this method is promising for protection of owner’s copyright of the image. Future work will focus on the watermark extraction of blurring image. REFERENCES [1] D. Zheng, Y. Liu and J. Zhao, “A Survey of RST Invariant Image Watermarking Algorithms,” The IEEE Canadian Conference on Electrical and Computer Engineering, pp. 2086-2089, 2006. [2] J. O’Ruanaidn and T. Pun, “Rotation, Scale and Translation invariant digital image watermarking,” Proc. IEEE International Conference on Image Processing, vol.1, pp.536-539, 1997. [3] M. Alghoniemy and A. H. Tewfik, “Geometric Invariance in Image Watermarking,” IEEE Transactions on Image Processing, vol.13, pp.145-153, 2004 -6-

Suggest Documents