Watermarking for JPEG Image Using Error ...

3 downloads 254 Views 196KB Size Report
communication, Error Correction Code (ECC), ... Reed-Solomon (RS) code, Discrete Cosine Transform. (DCT) .... watermarked image using Photoshop. A flower ...
Watermarking for JPEG Image Using Error Correction Coding Hailing Zhu, Willem A. Clarke and Hendrik C. Ferreira

Reed-Solomon (RS) code, Discrete Cosine Transform Abstract— Compression is the most common process that

(DCT), exclusive OR (XOR)

limits the robustness of watermarking. In this paper, we propose a watermarking method for JPEG compressed color images

in

the

semi-decompression

domain,

using

1. Introduction

Reed-Solomon (RS) codes. The watermark embedding and recovery processes can be applied without decompressing

With a proliferation of techniques for representation,

the compressed file completely. There is no perceptible

storage and distribution of digital multimedia information,

degradation between the watermarked image and the

the copyright protection issue such as unauthorized

original image. Experimental results show that the scheme is

copying, distribution and manipulation, is a growing

robust against some distortion attacks and JPEG lossy

concern. The prevention of digital data duplication

compression with different compression rates.

sparked the digital watermarking research techniques.

Index Terms— watermarking, JPEG, spread spectrum communication,

Error

Correction

Code

(ECC),

Digital Watermarking is a method of embedding some information into image, audio or video in a statistical and perceptually undetectable way. Watermarking techniques can at least ensure that the ownership information is embedded into the image, thus preventing or deterring

Manuscript received March 9, 2004. This work was

users from illegal usage. In addition to copyright

supported by the NRF under grant number 2053408.

protection, digital watermarking has other features, such

Hailing Zhu is with the Department of Electrical and Electronic Engineering, Rand Afrikaans University, P.O. Box 524, Auckland Park, 2006,

South

Africa

(phone:

+27-11-489-2463/2107;

fax:

+27-11-489-2357; e-mail: hlz @ ing.rau.ac.za).

Engineering, Rand Afrikaans University, P.O. Box 524, Auckland Park, South

Africa

(phone:

+27-11-489-2463/2107;

fax:

+27-11-489-2357; e-mail: wacl @ ing.rau.ac.za).

Hendrik C. Ferreira is with the Department of Electrical and Electronic Engineering, Rand Afrikaans University, P.O. Box 524, Auckland Park, 2006, South Africa (phone: +27-11-489-2463/2107; fax: +27-11-489-2357; e-mail: hcf @ ing.rau.ac.za).

control. It may also provide a mechanism for embedding descriptive or reference information into a given signal. In this work we focus on the application of copyright

Willem A. Clarke is with the Department of Electrical and Electronic

2006,

as content-based authentication and playback/copy

protection. For the purpose of ownership identification, a robust invisible watermark, which must be identified from the host data even with malicious manipulation, is required. A variety of watermarking schemes have been reported in recent years. Most of them are based on ideas known from spread spectrum communication. In practice, spread spectrum watermarks in their most simple form are vulnerable to a variety of attacks and modifications. To

improve the robustness of the spread spectrum watermarking, several methods have been proposed,

RGB color space is highly correlated and is not suitable

exploiting results and concepts from digital

for watermarking applications, except for the blue channel,

communication theory. For instance, in [5], ECC

used by some researchers because of its low sensitivity to

techniques, such as binary BCH and convolutional codes,

human perception [7]. For the application of

are used advantageously for watermarking. In [6], the

watermarking, the potential of these three channels can be

authors show that the (15,7)-RS code is the most

exploited by transforming colorspace to decrease the

convincing error correction code. Most of this research is

correlation among them. In [3], the authors compare

based on the grayscale raw image.

various color models, such as HIS, L*a*b, YIQ, YUV, and show the superiority of linear and uncorrelated

Multimedia data is usually compressed using standards

transforms YUV. In YUV color space, there are

such as JPEG, MPEG. Compression is the most common

luminance (Y) and chrominance (U and V) components.

process that limits the robustness of watermarking. In [2],

The three components have little statistical correlation. In

a spread spectrum technique is used to embed the

this paper the luminance and chrominance band of YUV

watermark, but the noise like watermark may be

color space is used to embed watermark.

suppressed significantly by JPEG compression. In [1,4], the authors described the basic spread spectrum

This paper is organized into four sections. The next

watermarking of compressed images. Because of the

section introduces the proposed watermarking method,

sensitivity of the DC coefficients, the watermark strength

followed by simulation results and conclusion in Section 3

(amplitude factor) is limited to the cover image. Thus the

and 4 respectively.

performance of the watermarking scheme is affected.

2. Watermarking Embedding and Retrieval In this paper we describe a watermarking scheme, that modifies DC coefficient of the luminance and

Basically one bit of the watermark information is

chrominance components of the JPEG color image, based

embedded in an 8-by-8 block by modifying its quantized

on spread spectrum communication. The property of the

luminance and chrominance DC coefficients slightly.

DCT coefficients between different JPEG compression

Changes in the quantized DC coefficients are visually

ratios is exploited for watermark detection. The extraction

detected. However, a small change on the last bit in the

processes utilize the compressed bitstream to reconstruct

DC coefficients can be perceptually undetectable. Figure

the pre-quantized DCT coefficients without

1(a) shows how to embed one bit of watermark

decompressing the image into pixel domain.

information into the quantized DC coefficient of an 8*8 block using the XOR function. The watermark bits are

There are some appropriate modifications on the embedding and extraction process in spread spectrum

interrelated with the cover image, and the watermark bits can be calculated directly from watermarked image.

watermarking to adapt to the sensitivity of the DC coefficients. To improve the performance of

Quantization is defined as the division of each DCT

watermarking, we use Error Correction Coding (ECC) to

coefficient by its corresponding quantizer step size,

deal with burst errors that occur in the watermarked

followed by rounding to the nearest integer. So we get

image. In this watermarking scheme Reed-Solomon coding is introduced. In our watermarking scheme, the (15, 7)-Reed-Solomon code was found by experiments to be the best error correction code.

Fmp =

FP × Q Qm

(1)

In Eq.1, Fp is a DCT coefficient vector of an arbitrary 8*8 RGB color transformations

block, Q is the quantization table for the present JPEG

lossy compression, Qm is the pre-quantization table, and F

m

p

I. 3. EXPERIMENTS AND RESULTS

is pre-quantized coefficient. If we quantize a DCT

coefficient with a reference quality factor, then this

In our simulation, the 512*512 image “Lion”(Figure 2a)

pre-quantized coefficient can be reconstructed after

is compressed with a pre-reference quality factor of 50. A

subsequent JPEG compression.

108-bit random sequence is used as watermark. The watermark information bits are encoded with different

In general, JPEG recommends a quality factor of 50-75

Reed-Solomon codes, i.e. RS (15,7), RS (15,9), RS

for merely acceptable quality. The default quality factor

(15,11), RS (31,7), RS (31,11), and RS (31,19). The

for JPEG compression is 50. In our scheme, the

encoded watermark bits are embedded using the method

quantization tables Q50 is set as the reference quantization

described in section 2.

table when the watermark information is embedded. Using Eq.1 the pre-quantized coefficient can be reconstructed after subsequent JPEG compression.

The Peak Signal to Noise Ratio (PSNR) is used to evaluate the distortion of watermarked images. The corresponding PSNR values are provided in Figure 3. To

For spread spectrum watermarking, in the absence of the

compare and evaluate the error correction capabilities of

original image (blind watermarking), matched bandpass

the various Reed-Solomon codes, the watermarked image

filtering is applied before correlation to decrease the

is compressed with a variety of quality factors. Figure 3

contribution of the original image to the correlation in

shows the different influence of these Reed-Solomon

watermark detection [4]. To perform bandpass filtering

codes on proposed watermarking method after

the JPEG image has to be decompressed completely. In

compressing the watermarked image with a variety of

our method, the watermark bits are calculated directly

JPEG compression rates. We can see that there is no error

from the watermarked image. Since the quantized DC

when the JPEG quality factor is above 30. Moreover, the

coefficients and quantization tables can be easily

(15,7)-Reed-Solomon code has the best error correction

extracted from the JPEG bits stream, the pre-quantized

capability in proposed watermarking method. Using a

coefficient can be reconstructed easily after future JPEG

(15,7)-Reed-Solomon code, we found that for a JPEG

compression. Figure1 (b) shows how to extract one

quality factor larger than 20 there are no errors.

watermark bit from reconstructed DC coefficient. With the XOR function, there is no need to perform filtering

The classical test image 512*512 “Baboon” (figure 2b)

and the watermark extraction is performed at the

from StirMark homepage was watermarked using the

semi-decompressed stage.

proposed watermarking method with a

Furthermore, to improve the accuracy of the watermark

(15,7)-Reed-Solomon code. The watermark is a binary

extraction and the ability to defend against attacks, ECC is

image of size 9*12. To evaluate the robustness against

used to deal with random and burst errors, which occur in

malicious modifications, we manipulated the

the watermarked image. The ECC is used for the

watermarked image using Photoshop. A flower from other

watermark sequence. Due to its burst error correction

image was pasted and the nose of baboon was modified.

property, Reed-Solomon code is adopted in our scheme.

The Normalize Correlation (NC) is used to measure the

In order to alleviate the load on the Reed-Solomon (RS)

quantitative similarity between the original watermark and

code, block interleaving is applied.

the extracted watermark. Figures 4a-b shows the original image and the watermarked image with manipulation. The

According to spread spectrum communications, a

PSNR value of the watermarked image is 31.3797dB. The

Pseudo-random Noise (PN) sequence is used to

original watermark and the watermark extracted from

randomize the watermark bits. The key, which generates

Figure 4b are shown in Figure 4c, the NC value is 1.

the PN sequence, is needed to the watermark extraction.

Figures 4d-f show the extracted watermarks and the corresponding NC values that come from the “corrupted”

watermarked image (Figure 4c) undergoing lossy

[7] A. Nikolaidis, F. Jordan and F. Bossen, “Digital signature of Color

compression with different JPEG compression rates. We

images Using Amplitude Modulation”, Proc. SPIE Electronic Imaging

can see when the quality factor is above 40 the watermark

97, Storage and Retrieval for Image and Video Databases, pp.518-526,

can be extracted exactly.

San Jose, CA, Feb. 1997 [8] Scott Craver, Nasir Memon, and Boon-Lock Yeo. “Resolving

4. Conclusion

rightful ownerships with invisible watermarking techniques:

In this paper, we presented a digital watermarking method that is robust to lossy compression and malicious modifications for JPEG color image. Using the XOR function, the watermark can be retrieved exactly without the original image. The watermark embedding and retrieval processes are preformed without decompressing the JPEG image completely. In conjunction with the error correction capability of Reed-Solomon codes, the watermarking is robust against recompression processes and some image processing.

II. REFERENCES

[1] Pei-chun Chen, Yung-sheng Chen and Wen-hsing Hsu “Adaptive-rate image watermarking based on spread spectrum communication technique”, 3rd World Multiconference on Circuits, Systems, Communications and Computers (CSCC'99), Athens, Greece, July 1999. [2] I.Cox, J.Kilian, F.Thomoson Leigton and T.Shamoon, “Secure Spread Spectrum watermarking for Multimedia”, IEEE Trans. On Image Processing, vol.6, NO. 12, DEC.1997 [3] S.A.M. Gilani, I. Kostopoulos and A.N. Skodras, “Color image-adaptive watermarking”, Proc. 14th Int. Conf. on Digital Signal Processing (DSP2002), Vol. 2, pp. 721-724, Santorini, Greece, 1-3 July 2002 [4]Frank Hartung and Bernd Girod “Watermrking of uncompressed and compressed video”. Signal Processing Vol. 66, No. 3, May 1998 pp.283-301. [5] J.Hernàndez, J.-F. Felaigle and B. Macq, “Improving Data Hiding by Using Convolutional Codes and Soft-Decision Decoding”, Proc. of the SPIE/IST: Security and Watermarking of Multimedia Content, San Jose, USA, pp.24-47, Jan.2000 [6] N. Terzijia, M. Repges, K. Luck, W. Grisselhardt, “Impact of different Reed-Solomon codes on digital watermarks based on DWT”, Multimedia and Security Workshop at ACM Multimedia 2002

Limitations, Attacks, and Implications”. IEEE Journal on Selected Areas in Communications, Vol.16. May 1998

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT)
REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < R S 1 5 ,7 P S N R = 2 9 .5 2 2 8

R S 1 5 , 9 P S N R = 2 9 .5 2 1 2

R S 1 5 ,1 1 P S N R = 2 9 . 6 4 7 5

R S 3 1 ,7 P S N R = 2 9 .5 8 9 5

R S 3 1 , 1 1 P S N R = 2 9 .5 9 7 4

R S 3 1 ,1 9 P S N R = 2 9 . 5 7 2 7

6

6 0 .0 0 %

5 0 .0 0 %

Errors

4 0 .0 0 %

3 0 .0 0 %

2 0 .0 0 %

1 0 .0 0 %

0 .0 0 % Q F=50

Q F=40

Q F=30

Q F=20

J P E G C o m p r e s s io n

Q F=15

Fig. 3. Performance of various RS-codes after suffering JPEG compression with different quality factor and their corresponding PSNR

(a) Original baboon image

(b) Watermarked image with modification

(c) Original watermark and recovered watermark

(d) Quality Factor =40 NC=1

(e) Quality Factor =30 NC=0.9130

(f) Quality Factor=25 NC=0.8997

Fig. 4. Modification and compression attacks

Suggest Documents