Академический Документы
Профессиональный Документы
Культура Документы
Lala Z. Krikor
Thawar Arif
Zyad Shaaban
Abstract: Invisible watermarking methods have been applied in frequency domains, trying to embed a small image inside a large
original image. The original bitmap image will be converted into frequency domain to obtain the discrete cosine transform (DCT)
matrices from its blocks. The bits of the logo image are embedded in random color components of the original image, as well as in
random positions in each selected block. These positions are alternating current (AC) coefficients of the DCT matrix. The randomness
is obtained from RC4 pseudorandom bit generator that determines in which color component this logo image bits will be embedded.
The embedded bits have been hidden in random blocks in the image, which are chosen according to a (semi-random) function proposed
in this work.
Keywords:
Watermarking, discrete cosine transform (DCT), pseudorandom bit generator, RC4, JPEG
Introduction
Digital image watermarking has received increasing attention in the last few years due to rapid growth in the
internet traffic, as well as its significance in content authentication and copyright protection for digital multimedia
data[1] . During images transfer, data integrity is not really
secure. Watermarking can be an answer to such problems.
For applications dealing with images, the watermarking objective is to embed an invisible message inside the image
data[2] .
Watermarking (data hiding) is the process of embedding
data into a multimedia element, such as an image, audio, or
video file. This embedded data can later be extracted from,
or detected in, the multimedia for security purposes[3] . In
general, a digital watermark is a code that is embedded
inside an image. It acts as a digital signature, giving the
image a sense of ownership or authenticity[4] .
Watermarking applications include copyright protection,
authentication, and embedded and hidden information.
First, watermarking systems that are intended for copyright protection require a very high degree of robustness.
Then, watermarking process for authentication belongs to
the fragile class of schemes. Slightest change in the image
completely destroys the mark. Finally, watermarking for
embedding information requires resistance against moderate level of modification due to routine image processing,
such as compression or cropping[5] . Watermarking techniques developed for images are mainly classified into visible
and invisible approaches. While the visible methods provide
means for overt assertion of ownership with logos, the invisible methods provide covert protection of these rights[6] .
In the classification of watermarking schemes, an important criterion is the type of information needed by the
detector[3] :
1) Non-blind schemes require both the original image and
the secret key(s) for watermark embedding.
2) Semi-blind schemes require the secret key(s) and the
watermark bit sequence.
Manuscript received March 5, 2009; revised May 23, 2009
This work was supported by the Deanship of Research and Graduate
Studies at Applied Science University, Amman, Jordan.
18
Digital watermarks and their techniques can be subdivided and segmented into various categories; for example,
they can be classified according to the application, source
type (image watermarks, video watermarks, audio watermarks, and text watermarks), human perception, and technique used. As watermarks can be applied in the spatial or
frequency domain, different concepts, such as DFT, DCT,
and wavelet transformation, or, additionally, manipulations
in the color domain and noise adding, can be mentioned.
Furthermore, digital watermarks can be subdivided on the
basis of human perception. Digital watermarks can be invisible or visible. We see visible watermarks every day
watching television, that is, TV station logos. They can
be robust against operations or even fragile for use in copy
control or authenticity applications. At least, digital watermarks can be subdivided into blind and non-blind detection techniques, which are strongly related to the decoding
process[13] .
In order to detect the watermark information, blind and
non-blind techniques are used. If the detection of the digital watermark can be done without the original data, such
techniques are called blind. Here, the source document is
scanned and the watermark information is extracted. On
the other hand, non-blind techniques use the original source
to extract the watermark by simple comparison and correlation procedures. However, it turns out that blind techniques
are more insecure than non-blind methods[13] .
DCT
Fig. 1
RC4
The byte K is XORed with the plaintext to produce ciphertext or XORed with the ciphertext to produce plaintext. Encryption is fast about 10 times faster than DES.
Initializing the S-box is also easy. First, fill it linearly:
S0 = 0, S1 = 1, , S255 = 255. Then, fill another 256
bytes array with the key, repeating the key when necessary
to fill the entire array: K0 , K1 , , K255 . Set the index j
at zero. Then,
for i = 0 to 255:
j = (j + Si + Ki ) mod 256
swap Si and Sj
RSADSI claims that the algorithm is immune to differential and linear cryptanalysis, does not seem to have any
19
small cycles, and is highly nonlinear. (There are no public cryptanalytic results. RC4 can be in about 256! 256!
possible states: an enormous number.) The S-box slowly
evolves with use: i ensures that every element changes, and
j ensures that the elements change randomly. The algorithm is so simple that most programmers can quickly code
it from memory.
It should be possible to generalize this idea to larger Sboxes and word sizes. The previous version is an 8 bits RC4.
There is no reason why you cannot define 16 bits RC4 with
a 16 16 S-box (100 K of memory) and a 16 bits word. You
would have to iterate the initial setup a lot more times
65536 to keep with the stated design but the resulting
algorithm should be faster.
RC4 has special export status if its key length is 40 bits
or less. This special export status has nothing to do with
the secrecy of the algorithm, although RSADSI has hinted
for years that it does. The name is trademarked, so anyone
who writes his own code has to call it something else[17] .
Fig. 2 shows the lookup stage of RC4. The output byte
is selected by looking up the values of S[i] and S[j], adding
them together modulo 256, and then looking up the sum in
S; S[S[i] + S[j]] is used as a byte of the key stream, K.
Fig. 2
Fig. 3
An example
Name
Sequence
Bit sequence
1 1 0 1 0 0 1 1
Color component
YCrCbYCrCbY
Embedding sequence
YCrYYCr
Step 7. This step determines in which block the embedded bits will be hidden. A non-sequence of number is
generated using a special algorithm (called block number
20
T otalN um = T otalN um + 1
End For
Results
Fig. 4
Fig. 5
21
Conclusions
References
[1] B. C. Mohan, S. S. Kumar. A robust image watermarking scheme using singular value decomposition. Journal of
Multimedia, vol. 3, no. 1, pp. 715, 2008.
Fig. 6
[2] G. Lo-varco, W. Puech, M. Dumas. DCT-based watermarking method using color components. In Proceedings of the
2nd European Conference on Color in Graphics, Imaging
and Vision, Aachen, Germany, pp. 146150, 2004.
[3] A. Sverdlov, S. Dexter, A. M. Eskicioglu. Robust DCTSVD domain image watermarking for copyright protection:
Embedding data in all frequencies. In Proceedings of International Multimedia Conference, Germany, pp. 166174,
2004.
[4] E. H. Fu. Literature Survey on Digital Image Watermarking, Technical Report, EE381K-Multidimensional Signal
Processing, 1998.
[5] G. Lo-varco, W. Puech, W. Dumas. Content based watermarking for securing color images. Journal of Imaging Science and Technology, vol. 49, no. 5, pp. 464473, 2005.
Fig. 7
Fig. 8
Fig. 9
[13] J. Seitz. Digital Watermarking for Digital Media, Information Science Publishing, 2005.
22