Академический Документы
Профессиональный Документы
Культура Документы
= + >
+ =
s s
=
(2)
Since not only the watermark embedding and extraction processes but also the
reconstruction of the QDCT blocks need un-watermarked DU
0
data, the embedding
order is very important. The embedding order of blocks is depicted in Fig. 4. First, we
embed the watermark into DF
n
to generate the watermarked DF
n
, referring to wDF
n
.
Then, we generate the watermarked DU
n
, referring to wDU
n
, by using the data of
wDF
n
and DU
0
. Last, we embed the watermark into DU
0
to make the watermarked
JPEG image.
3.3 Watermark Extraction and Image Reconstruction
The watermark was embedded into the differential histogram of the QDCT
coefficients by shifting the histogram. We first calculated nine differential blocks by
subtracting base QDCT block DU
0
from their adjacent QDCT blocks in three
channels. Then, the watermark was embedded into nine differential blocks by using
the histogram shifting.
Fig. 3. Visiting order of differential blocks.
Proceedings of Global Engineering, Science and Technology Conference
1 - 2 April 2013, Dubai, UAE, ISBN: 978-1-922069-21-4
6
Fig. 4. Watermark embedding order of target blocks.
However, since the differential block DF
n
is generated by using the un-watermarked
base QDCT block DU
0
, we first extract the watermark from wDU
0
and reconstruct
DU
0
from wDU
0
. Next, wDF
n
are generated by using the reconstructed DU
0
and
wDU
n
. Then, we extract the embedded watermark from wDF
n
and reconstruct DF
n
.
Finally, we can reconstruct DU
1
, DU
2
, and DU
3
by using these reconstructed DF
n
and
DU
0
. The overall reconstruction procedure is illustrated in Fig. 5.
Fig. 5. Watermark extraction and original JPEG image recovery from differential
block data.
The way to extract the watermark and to restore the original JPEG image can be
modeled as Equation (3) and (4). The extracted watermark is used to authenticate
the JPEG images.
( )
( ) ( ) { }
, if 0
, if 0,1
for 0 ( ( ) 1),
index of Zigzag order
skip i
wm j
ZQDCT i ZQDCT i
j sizeof wm
i
e e
=
=
e
s s
=
(3)
( )
( ) ( )
( ) ( )
, if 0 or 0
1, if 0
for index of zigzag order
i i
i
i i
ZQDCT i ZQDCT
ZQDCT
ZQDCT ZQDCT
i
e e
e
e e
= <
=
>
=
(4)
Proceedings of Global Engineering, Science and Technology Conference
1 - 2 April 2013, Dubai, UAE, ISBN: 978-1-922069-21-4
7
4. Experimental Results
We evaluate the performance of the proposed algorithm by using 24 bits images of
512512 pixels from USC-SIPI (University of Southern California-Signal & Image
Processing Institute). The 64 bits watermark is inserted into each block of 1616
pixels.
Fig. 6. Perceptual quality comparison between standard JPEG compression and our
watermarked JPEG compression.
Standard JPEG
compression
Proposed JPEG
compression
First, we evaluate the perceptual invisibility of the proposed algorithm. To test
invisibility, we compared the PSNRs between the standard JPEG images and
watermarked JPEG images using the proposed algorithm. Test results are shown in
Table 1 and Fig. 6. As shown in the results, the visual quality of watermarked JPEG
images was slightly lower than standard one. However, the difference was not so
high. Moreover, the un-watermarked JPEG images could be reconstructed after
Proceedings of Global Engineering, Science and Technology Conference
1 - 2 April 2013, Dubai, UAE, ISBN: 978-1-922069-21-4
8
watermark extraction because the proposed reversible algorithm can remove the
embedded watermark and recover the original JPEG compression coefficients at
100%.
Table 1. PSNR comparison
Image
Standard JPEG
Compression
Proposed JPEG
Compression
Airplane 37.68 dB 33.29 dB
Baboon 31.64 dB 30.13 dB
House 35.66 dB 32.19 dB
Lena 36.34 dB 32.75 dB
Pepper 35.16 dB 32.19 dB
Sailboat 33.55 dB 31.24 dB
Splash 38.42 dB 33.95 dB
Tiffany 36.13 dB 32.88 dB
Average 35.57 dB 32.33 dB
Since the proposed algorithm is designed for JPEG images, the comparison of
compression ratios before and after applying the proposed reversible watermarking
algorithm could be one criterion of the performance measure. Compression ratios
shown in Table 2 were calculated by using the ratio of the size of an original image
formatted in BMP to the size of a JPEG compressed image including the header
information. As shown in the results, the differences between the compression ratios
of the standard JPEG compressed images and those of the watermarked JPEG
images were very small. Thus, we can conclude that the proposed algorithm
performs well in the aspect of compression ratios.
Table 2. Compression ratio comparison (Unit : byte)
Image BMP
Standard JPEG
Compression
Proposed JPEG
Compression
Airplane 786,488 48,961 93.77% 69,564 91.16%
Baboon 786,488 104,711 86.69% 127,001 83.85%
House 786,488 64,215 91.84% 85,461 89.13%
Lena 786,488 49,008 93.77% 69,296 91.19%
Pepper 786,488 55,831 92.90% 76,796 90.24%
Sailboat 786,488 70,265 91.07% 91,984 88.30%
Splash 786,488 42,574 94.59% 59,807 92.40%
Tiffany 786,488 50,719 93.55% 68,876 91.24%
Average 786,488 60,786 92.27% 81,098 89.69%
5. Conclusion
This paper presented a novel JPEG authentication algorithm using reversible
watermarking. In the watermark embedding process, we generated differential
blocks by subtracting QDCT coefficients from adjacent QDCT blocks and embedded
Proceedings of Global Engineering, Science and Technology Conference
1 - 2 April 2013, Dubai, UAE, ISBN: 978-1-922069-21-4
9
the watermark into these differential blocks by shifting the histogram. In the
watermark extraction process, we successfully reconstructed and authenticated the
original JPEG image after extracting the watermark.
Since the proposed algorithm is designed in the base of a standard JPEG
compression method, it could be easily utilized as an add-on of standard JPEG
compression. Also, since the watermarked image is very sensitive to modification
and restoration, the proposed algorithm could be utilized to verify and authenticate
the integrity of a suspicious image.
Acknowledgement
This research project was supported by the Basic Science Research Program
through the National Research Foundation of Korea (NRF) funded by the Ministry of
Education, Science and Technology (2012-0002862).
References
[1] D. G. Yeo, H.-Y. Lee, and B. M. Kim, High Capacity Reversible Watermarking
using Differential Histogram Shifting and Predicted Error Compensation, Journal
of Electronic Imaging, vol. 20, no. 1, pp. 013001-1-12, 2011.
[2] D. G. Yeo and H.-Y. Lee, Block-based image authentication algorithm using
differential histogram-based reversible watermarking, Korea information
processing society, vol. 18, no. 4, pp. 355-364, 2011.
[3] H. N. Choi, J. W. Kim, J. W. Choi, and H. I. Kim, Reversible watermarking in
JPEG compression domain, Korea information processing society, vol. 17, pp.
121-130, 2007.
[4] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, Lossless generalized-LSB
data embedding, IEEE Transactions on Image Processing, vol. 14, no. 2, pp.
253-266, 2005.
[5] S. Lee, C. D. Yoo, and T. Kalker, Reversible image watermarking based on
integer-to-integer wavelet transform, IEEE Transactions on Information
Forensics and Security, vol. 2, no. 3, pp. 321-330, 2007.