A Contourlet-Based Image Watermarking Scheme With Removal and Geometrical Attacks

A Robust and Efficient Method for Image Watermarking

by Sapna Sangwan*,

- Published in Journal of Advances in Science and Technology, E-ISSN: 2230-9659

Volume 2, Issue No. 2, Nov 2011, Pages 0 - 0 (0)

Published by: Ignited Minds Journals


ABSTRACT

Wepropose a new multiresolution watermarking method for still images based on thecontourlet transform (CT). In our approach, the watermark is a grayscale imagewhich is embedded into the highest frequency sub band of the host image in itscontourlet domain. We demonstrate that in comparison to other methods, thismethod enables us to embed more amounts of data into the directional subbandsof the host image without degrading its perceptibility. The experimentalresults show robustness against several common watermarking attacks such ascompression, adding noise, filtering, and geometrical transformations. Sincethe proposed approach can embed considerable payload, while providing goodperceptual transparency and resistance to many attacks, it is a suitablealgorithm for fingerprinting applications.

KEYWORD

contourlet-based, image watermarking, removal attacks, geometrical attacks, multiresolution, grayscale image, embedding, data, directional subbands, robustness

INTRODUCTION

Recent rapid growth of distributed networks such as Internet enables the users and content providers to access, manipulate, and distribute digital contents in high volumes. In this situation, there is a strong need for techniques to protect the copyright of the original data to prevent its unauthorized duplication. One approach to address this problem involves adding an invisible structure to a host media to prove its copyright ownership. These structures are known as digital watermarks. Digital watermarking is performed upon various types of digital contents such as images, audio, text, video, and 3D models. It is applied to many applications, such as copyright protection, data authentication, fingerprinting, and data hiding [1]. Current methods of watermarking images, depending on whether the original image is used during watermark extraction process or not, could be divided into two categories: blind and non-blind methods. Schemes reported in [2, 3] are nonblind methods, while the methods in [4–9] are categorized as blind methods.

REVIEW OF LITERATURE

Most of the reported schemes use an additive watermark to the image in the spatial domain or in frequency domain. Recent works on digital watermarking for still images are applied on frequency domain. Among the transform domain techniques, discrete wavelet transform-(DWT-) based techniques are more popular, since DWT has a number of advantages over other transforms including space-frequency localization, multiresolution representation, superior HVS modeling, linear complexity, and adaptivity [10]. In general, the DWT algorithms try to locate regions of high frequency or middle frequency to embed information, imperceptibly [11]. Even though DWT is popular, powerful, and familiar among watermarking techniques, it has its own limitations in capturing the directional information such as smooth contours and the directional edges of the image. This problem is addressed by contourlet transform (CT) [12]. The contourlet transform was developed as an improvement over wavelet where the directional information is important. In addition to multiscale and time-frequency localization proprieties of wavelets, CT offers directionality and anisotropy. Zaboli and Moin [2] used the human visual System characteristics and an entropy-based approach to create an efficient watermarking scheme. It decomposes the original image in CT domain in four hierarchical levels and watermarks it with a binary logo image which is scrambled through a well-known PN sequence. They showed adding a scrambled watermark to high-pass coefficients in an adaptive way based on entropy results in a high performance detection capability for watermark extraction.

2

Watermark Embedding Technique In the proposed algorithm, the watermark which is a grayscale image, with as much as 25% of the host image size, is embedded into the gray level host image of size . The host image and the watermark are transformed into the contourlet domain. Then, the CT coefficients of the last directional subband of the host image are modified to embed the watermark. The steps involved in watermark embedding are shown in Figure. We use to denote the host image, the watermarked image, and the watermark. The technique is comprised in three main steps as discussed below. Figure Embedding algorithm. The host image of size and the watermark of size are transformed into the CT domain. An "n" level pyramidal structure is selected for LP decomposition. At each level , there are directional subbands, where . The highest frequency subband of the host image is selected for watermark embedding. Watermark decomposition results in two subbands , and a lowpass image. Since and have the same resolution, therefore we choose one of them, in addition to the lowpass image for watermark embedding. The coefficients of the selected subband are modified as follows [17]:

(2)

Where represents level, directional subband coefficients, and α is a weighting factor which controls robustness and perceptual quality. Inverse contourlet transform (ICT) is applied by considering the Watermark Extraction Process For retrieving the watermark, we need a copy of the original image as a reference. By using the inverse embedding formula (3), we can extract the embedded watermark

(3)

The extraction process consists of the following steps. Both watermarked and original images are transformed into CT domain. The directional subband and the lowpass image of the embedded watermark will be retrieved by subtracting the highest frequency subbands of the original and the watermarked image by using (3). For reconstructing the watermark, Laplacian Pyramid requires both directional subbands (W1,W2) and the lowpass image (L). Instead of inputting (L,W1,W2) we input (L,W1,W1) into the LP. The watermark extraction process is summarized in Figure 7.

Figure Extraction algorithm.

By increasing the levels of decomposition, the watermarking capacity is also increased, and the quality of extracted watermark is improved. In order to achieve this goal, after selecting a subband, we can use other directional subbands which have the highest level of energy. The watermarked image quality is measured by the PSNR between and , formulated by (4)

Sapna Sangwan1 Dr. Anuj Kumar2

Here, and are the original and recovered watermark signals, respectively. The normalized correlation is calculated by

(5)

We have performed experiments with various watermarks and popular host images such as Lena, Barbara, Baboon, Cameraman, City, Couple, Man, Boat, Elaine, Peppers, and Zelda of size 512×512. The watermark is a grayscale fingerprint (.bmp) of size 128×128, which contains lots of curves and significant details. Therefore, it can be a perfect criterion for measuring the performance of the proposed method. In addition, it can be used in fingerprinting applications. In (2), α was set to 0.1 to obtain a tradeoff between perceptibility and robustness. In both LP and DFB decomposition, "PKVA" filters [18] were used because of their efficient implementation. We decomposed the host image into four levels, and the watermark into one level.

WATERMARK INVISIBILITY

Figures 8(a) and 8(b) provide the comparison between the original Lena test image and its corresponding watermarked image.The original watermark and the extracted watermark are also shown in Figures 8(c) and 8(d), respectively. The results of embedding data in the highest frequency subband of the host image are shown

Figure

(a) Lena image. (b) Watermarked image. (c) Original watermark. (d) Extracted watermark. Khalighi et al. EURASIP Journal on Advances in Signal Processing 2010 2010:540723 doi:10.1155/2010/540723 watermark embedding. The results of embedding the watermark in the 16th directional subbands of the host images were as follows. The watermark invisibility can be guaranteed at average PSNR value of 46.96 dB for all the test images due to their similar characteristics and the NC value of 0.9862 for all the extracted watermarks except for the Man image, for which the PSNR and NC values were 47.09 and 0.9838, respectively.

CONCLUSION

The results of hiding more amounts of data into the highest and other directional subbands of the Lena test image are shown in Table 2. The PSNR and NC values for other subbands are also shown in columns 2 and 3 of the same table, respectively. We used the 1st and the 4th directional subbands that have the highest level of energy after the 16th subband. In addition to embedding the watermark into the 16th directional subband, we hide another version of the watermark into the 1st and the 4th subband, and thus we could embed 34 KB of data into the host image without degrading its perceptual quality. Embedding the watermark in other subbands with lower energy than a given threshold will result in perceptual distortion in the watermarked image. Table 3 shows the results of embedding data in the Lena test image with different sizes. The size of the watermark is 25% of the size of the host image.

REFERENCES

1. J Cox, ML Miller, JA Bloom, Watermarking applications and their properties. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC '00), 2000, Las Vegas, Nev, USA, 6–10 2. S Zaboli, MS Moin, CEW: A non-blind adaptive image watermarking approach based on entropy in contourlet domain. 2007 IEEE International Symposium on Industrial Electronics, ISIE 2007, June 2007, esp, 1687–1692 3. M Jayalakshmi, SN Merchant, UB Desai, Digital watermarking in contourlet domain. 18th International Conference on Pattern Recognition, ICPR 2006, August 2006, chn, 861–864 4. G Duan, ATS Ho, X Zhao, A Novel non-redundant contourlet transform for robust image watermarking against non-geometrical and geometrical attacks. Proceedings of the 5th International Conference on Visual

4

5. S Xiao, H Ling, F Zou, Z Lu, Adaptive image watermarking algorithm in contourlet domain. 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2007, November 2007, chn, 125–130 6. E Salahi, MS Moin, A Salahi, A new visually imperceptible and robust image watermarking scheme in Contourlet domain. 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, August 2008, chn, 457–460 7. Z Shu, S Wang, C Deng, G Liu, L Zhang, Watermarking algorithm based on contourlet transform and human visual model. 2008 International Conference on Embedded Software and Systems, ICESS-08, July 2008, chn, 348–352 8. X Lian, X Ding, D Guo, Digital watermarking based on non-sampled contourlet transform. 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID, April 2007, chn, 138–141 9. F Wei, T Ming, J Hong-Bing, An adaptive watermark scheme based on contourlet transform. International Symposium on Computer Science and Computational Technology, ISCSCT 2008, December 2008, chn, 677–681 10. P Meerwald, A Uhl, A survey of wavelet domain watermarking algorithms. Electronic Imaging, Security and Watermarking of Multimedia Contents, January 2001, Proceedings of SPIE 4314

11. D Kundur, D Hatzinakos, Towards robust logo watermarking using multiresolution image fusion principles. IEEE Transactions on Image Processing 6(1), 185–198 (2004) MN Do, M Vetterli, The contourlet transform: An efficient directional multiresolution image representation. IEEE Transactions on Image Processing 14(12), 2091–2106 (2005).PubMed Abstract