Академический Документы
Профессиональный Документы
Культура Документы
org/ie
RobustGreyScaleImageWatermarking
UsingTwoDimensionalWalshCoding
KamalA.Ahmed*1,HussainAlAhmad2, PatrickGaydecki3
SchoolofElectricalandElectronicEngineering,UniversityofManchester,UK,2DepartmentofElectronic
Engineering,KhalifaUniversityofScience,TechnologyandResearch,Sharjah,UAE,3SchoolofElectricaland
ElectronicEngineering,UniversityofManchester,UK
1
*1
kamal.ahmed@postgrad.manchester.ac.uk;2alahmad@kustar.ac.ae;3patrick.gaydecki@manchester.ac.uk
Abstract
1DWalshcodingwaspresentedtoimprovetherobustness
of digital image watermarking. In this paper, an efficient,
new two dimensional Walsh code approach to copyright
protection is proposed. The proposed technique inserts the
Walsh coded binary bits of handwritten signatures in the
DCT blocks of the 512512 grey scale colour images. The
embedding procedure is realized by transforming the host
image into DCT domain. The low frequency coefficients of
theDCTblocksundergomodificationbyinsertingtheWalsh
coded watermark. The algorithm is blind and does not
require the original image in the extracting process. The
distortion caused by the watermarking algorithms is
invisible and it has been assessed by using the PSNR and
SSIM. The empirical results show the effectiveness of the
proposed scheme to accomplish high imperceptible quality
watermarked image and smooth watermark detection. The
robustness of the algorithm has been verified using Stir
Mark benchmark and other conventional attacks. The
watermark recovery is achieved 100% even by using
significant JPEG compression and some common signal
processingattacks.
thewatermarkedimages.Theobjectiveassessmentcan
bedonebyusingthepeaksignaltonoiseratio(PSNR)
and the structured similarity index measure (SSIM)
(Wang Hou, 2004). As well the watermarking
algorithm must be robust in order to protect the
embedded information inside the host images. Thus,
the watermark must be resistant to unauthorized
detection and decoding. In addition, the watermark
must be tolerant toimageprocessing techniques such
as compression as well as to intentional attempts to
destroy or remove the watermark such as filtering
operations.
Digital watermarking can be classified according to
theinsertiondomainwhichiseitherthespatialdomain
orthetransformeddomain.Inthespatialdomain,the
watermark can be embedded by using the least
significant bits (LSB) technique. The transformed
domain algorithms are more robust compared to the
spatial domain ones. Examples of transform domains
are the discrete Fourier transform (DFT), discrete
cosine transform (DCT), and discrete wavelet
transform (DWT) (Barni M., 1998, Katzenbeisser S.,
2000, Lin PL., 2000). The DCT domain is the most
popular one for image watermarking because of the
wide use of the JPEG compression algorithm.
Watermarks may also be classified as robust and
fragile. Robust watermarks are those which are
difficulttoremovefromtheobjectintowhichtheyare
embedded, despite various attacks they might be
subjected to. Fragile watermarks are those that are
easilydestroyedbyanyattempttotamperwiththem.
Fragilewatermarkingisusedtochecktheauthenticity
of the image. Another classification is based on the
availabilityoftheoriginalimageduringtheextraction
process. The algorithm is called blind if the original
Keywords
WaterMarking; DCT; Walsh Coding; Grey Scale Image; Zena
Image
Introduction
The availability of personal computers and the
internethascausedanincreaseinmediapiracyalong
withtheprevailingofcopyingandmodifyingfilesand
documents. The illegal copying of some types of
media has been a subject of concern for many years.
Asaresult,anurgentsolutiontocopyrightprotection
andauthenticationisneeded.Digitalwatermarkingis
an effective solution to protect intellectual properties
and copyrights by hiding information such as logos,
signaturesortextintomultimediadatasuchasimages,
videos,oraudiofiles.
Watermarkedimagesmustnotbevisiblydegradedby
15
www.seipub.org/ieInformationEngineeringVolume2Issue2,June2013
bitsasshowninFigure1.
w 1 1 1 1
1
FIG.1WALSHCODINGOFHANDWRITTENSIGNATURE
w 2 1 1 1 1
(1)
DCTEmbedding
w 3 1 1 1 1
w 4 1 1 1 1
16
InformationEngineeringVolume2Issue2,June2013www.seipub.org/ie
FIG.2DCTBLOCKENCODERinTHEFREQUENCYDOMAIN
WatermarkDetection
Fig.4.TESTIMAGESANDTHEIRWATERMARKEDVERSION
FIG.3TheEXTRACTIONPROCESS
17
www.seipub.org/ieInformationEngineeringVolume2Issue2,June2013
FromTable2,itisalsoshownthatthesignaturecanbe
recovered with a scaling factor of 4 with JPEG
quality>90.Asthescalingfactorisincreasedthenthe
robustnessisimprovedandatscalingfactorof20the
signaturecanberecoveredwithJPEGquality>27.The
results show that the proposed algorithm is robust
against the JPEG attack. It should be noted that there
should be a compromise between the robustness and
thedistortioncausedtothewatermarkedimages.The
algorithm is tested using the Stir mark software to
assesstherobustnessagainstotherattacks.Thetesting
is done on the standard image of Lena with scaling
factor20.Table3showstheStirmarkattacksandtheir
normalisedcorrelation(NC)values.
TABLE1PSNRANDSSIMWITHWALSH4
18
TABLE2THELOWESTJPEGFACTORSWITHWALSH4
InformationEngineeringVolume2Issue2,June2013www.seipub.org/ie
TABLE3STIRMARKATTACKSANDTHEIRNORMALISEDCORRELATION
(NC)VALUESWITHWALSH4
Comparison
Inprevioussection,theperformancesoftheproposed
scheme was assessed in terms of robustness and
watermarked image fidelity. This was done using a
range of simulation tests which have shown that the
proposed scheme is robust and secure against JPEG
compression and a wide range of image processing
operations.Tovalidatetheabovescheme,comparison
will be run between the proposed scheme and some
methods in the literature. The peak signal to noise
ratio (PSNR) was adopted to quantify the similarity
betweentheoriginalgreyimageandthewatermarked
image. The normalised correlation (NC) was also
employed to measure the similarity between the
original watermark and the corrupted watermark. To
carry out this assessment, two comparisons were
made between the proposed scheme and existing
methods (Xiaochuan Gao, 2006, Gaorong Zeng, 2008). In
thisevaluation,astandard512512colourLenaimage
was used in conjunction with watermarks of
dimensions3232and6464pixels.
19
www.seipub.org/ieInformationEngineeringVolume2Issue2,June2013
REFERENCES
WATERMARKING
USING
TWO
TABLE5COMPARISONBETWEENTHEPROPOSEDALGORITHM
ANDMETHODIN[9]
Conclusions
Exhibition,Dubai,UAE,February2011,pp.299302
AlGindy A., A. Tawfik H. Al Ahmad and R.
Qahwaji,EnhancedDCTBasedTechniquewithShuffle
SchemeForRobustImageWatermarkingofHandwritten
Signatures,
Conference
for
20
International
May2009
Barni M., F. Bartolini, V. Cappellini, and A. Piva, A DCT
DomainSystemforRobustImageWatermarking,Signal
Processing,vol.66,1998,pp.357372
InformationEngineeringVolume2Issue2,June2013www.seipub.org/ie
LinPL.,RobustTransparentImageWatermarkingSystem
WalshCodingforRobustDigitalImageWatermarking,
Software,vol.50,2000,pp.107116
December2004
Processing,Vol.13,No.4,April2004,pp.600612
ApplicationWorkshops,IEEE,2008,pp573576
for
Steganography
and
Digital
Proceedings,IEEE,2006,Vol.4
Watermarking,ArtechHouse,London,2000
21