Академический Документы
Профессиональный Документы
Культура Документы
org
Published in IET Information Security
Received on 16th March 2009
Revised on 2nd June 2010
doi: 10.1049/iet-ifs.2009.0183
ISSN 1751-8709
Abstract: Watermarking is a technique to protect the copyright of digital media such as image, text, music and movie. In this
study, a robust watermarking scheme for multiple cover images and multiple owners is proposed. The proposed scheme
makes use of the visual cryptography (VC) technique, transform domain technique, chaos technique, noise reduction
technique and error correcting code technique where the VC technique provides the capability to protect the copyright of
multiple cover images for multiple owners, and the rest of the techniques are applied to enhance the robustness of the scheme.
Introduction
2
2.1
Preliminaries
Watermarking
www.ietdl.org
Generally, a watermarking scheme should meet the following
criteria:
1. Imperceptibility: It is hard to detect the differences between
the original cover images and the watermarked ones by the
human visual system. The imperceptibility is perfect if
the watermarked images are identical/indistinguishable to the
original cover images.
2. Robustness: The watermark still can be extracted even the
watermarked image suffers from various attacks.
3. Security: Only the owner of the cover images can extract
the watermark from the watermarked image.
4. Blindness: The original cover images are not required for
extracting the watermark. Hence, extra space is not required
for storing the cover images.
Currently, most of the watermarking schemes are based on
the transform domain techniques, including the discrete
Fourier transform [10], the discrete cosine transform [2, 11]
and the discrete wavelet transform (DWT) [3, 6, 8, 12],
because they provide better performance with respect to the
robustness than that based on the spatial domain.
Watermarking schemes for digital images suffer a lot of
attacks that aim at severing the relationship between the
watermarked image and the watermark, such as compression
attack, blurring attack, sharpening attack, scaling attack,
cropping attack, distortion attack and noise attack.
2.2
Visual cryptography
Chaos technique
xi+1
yi+1
=
1
k
1
k+1
xi
yi
mod N
where (xi , yi) and (xi+1 , yi+1) are the coordinates of pixels in
an image, i is the number of rounds of the torus
automorphism, and N N is the size of the image. The
pixel at position (x1 , y1) is moved to the position (xi , yi)
after i rounds of the torus automorphism.
The inversion of
1
1
= 1.
torus automorphism exists since det
k k+1
The torus automorphism is used to convert an image to a
chaotic image. It only ts square images, and it can be
extended to be applied on general size images. However, in
order to simplify the discussion, we only discuss our
watermarking scheme for square images in this paper (Our
scheme can easily be extended for cover images of general
size.).
The model of watermarking can be viewed as an information
transmission model, where the cover image is the channel and
the watermark is the message. The attacks of the watermarking
scheme add error pixels (noise) to the watermark (message).
For some attacks, the error pixels may be aggregated, for
example, the cropping attack. The torus automorphism can
scatter the error pixels to the entire image uniformly. Take
the cropping attack with 25% of the cover image being
cropped as an example, after the torus automorphism
process, there is on average one error pixel in each four
pixels, and hence we may have a chance to correct the error
pixel by the information of the remaining three correct pixels.
2.4
www.ietdl.org
robustness against compression attacks that apply transform
domain techniques, such as the JPEG compression. Many
watermarking schemes in the literature also applied the
transform domain technique to enhance their robustness [2,
3, 6, 8, 11, 12].
2.6
2.5
Proposed scheme
www.ietdl.org
Simulations
2552
MSE
www.ietdl.org
N21
2
where MSE (1/(N N )) N21
i0
j0 (Iij 2 I ij ) and Iij and
I ij are the pixels of the original image and the attacked image.
The AR is used to evaluate the similarity between the
original watermark and the extracted one[1, 2, 7], which is
dened as follows
AR =
CB
NB
Cover image
Watermark
Key image
Secret share
125
www.ietdl.org
Table 1
Attacks
a1
a2
a3
a4
a5
a6
a7
a8
a9
PSNR1
AR1
PSNR21
PSNR22
AR2
PSNR
AR
26.7781
0.99951
26.7781
27.1675
0.99927
26.0321
0.99561
29.5665
1
29.5665
30.1290
0.99951
29.0156
0.99814
23.4567
0.99927
23.4567
23.8553
0.99829
21.7134
0.99545
18.4996
0.99805
18.4996
18.7973
0.99463
19.0375
0.99057
20.7356
0.99707
20.7356
21.2863
0.99170
19.6412
0.99055
13.8229
0.99707
13.8229
15.6274
0.98804
15.3379
0.96952
9.6471
0.93042
9.6471
11.9705
0.83496
11.2267
0.86259
13.4937
0.92529
13.4937
13.5992
0.83496
14.2015
0.94168
12.1655
0.99609
12.1655
12.2601
0.98999
11.3993
0.97764
9.9148
0.4541
11.1057
11.2541
0.51294
8.3138
0.5295
Comparisons
www.ietdl.org
Table 2
Comparison of robustness
Attacks
JPEG (QF)
blurring
sharpening
cropping (10%)
cropping (25%)
scaling (1/64)
noising (A)
Table 3
Ours
[1]
[2]
[19]
[8]
[9]
[7]
[12]
1 (10%)
0.99927
0.99805
0.99707
0.93042
0.99707
0.99609 (20%)
0.91 (80%)
0.8872
0.8955
0.9597
n/a
0.883
n/a
0.7425 (20%)
0.8447
0.803
n/a
0.8691
n/a
n/a
0.9775 (25%)
0.8032
0.8398
n/a
n/a
0.7717
0.8948 (10%)
0.9951 (25%)
0.9761
0.9797
n/a
n/a
0.9766
0.9944 (10%)
0.996 (50%)
0.988
0.981
n/a
n/a
n/a
0.992
0.9817 (20%)
0.9204
0.9439
0.7475 (10%)
n/a
n/a
0.8977 (10%)
0.996 (10%)
0.996
0.986
n/a
n/a
0.983
0.994
Comparison of effectiveness
Attacks\scheme
robustness
imperceptibility
(P: perfect, D: degraded)
blindness
security
multiple users
multiple cover images
Ours
[1]
[2]
[3]
[4]
[5]
[6]
[19]
[8]
[9]
[7]
[12]
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
P
yes
yes
yes
yes
P
yes
yes
no
no
D
yes
yes
yes
no
P
yes
yes
no
no
D
yes
yes
no
no
D
yes
yes
no
no
D
yes
yes
no
no
P
yes
yes
no
no
P
yes
yes
no
no
P
yes
yes
no
no
P
yes
yes
no
no
P
yes
yes
no
no
Conclusions
Acknowledgments
References
www.ietdl.org
16 Cordaro, J., Wagner, T.: Optimum (n,2) codes for small values of
channel error probability, IEEE Trans. Inf. Theory, 1967, 13, (2),
pp. 349350
17 Liu, F., Wu, C.K., Lin, X.J.: Some extensions on
threshold visual cryptography schemes, Comput. J., 2010, 53, (1),
pp. 107119
128