Академический Документы
Профессиональный Документы
Культура Документы
−日本大学生産工学部第48回学術講演会講演概要(2015-12-5)−
2-56
not perceive the existence of the Fig. 1. Fuzzy inference system (FIS).
watermark. Imperceptibility ensures the
excellent perceptual quality of the In the HVS, there are two properties: (1)
protected image. luminance sensitivity: the brighter the background
Robustness is, the larger the embedded signal could be, and (2)
The hidden watermark must survive frequency sensitivity: the higher the frequency is,
― 319 ―
the larger the embedded signal could be. We use keep the amount of embedding
the DC coefficient in the DCT of an image as information moderate.
Rule4: If the image is bright and texture, then
luminance sensitivity. The frequency sensitivity is
keep the amount of embedding
estimated by quantizing the DCT coefficients of an information large.
image using the JPEG quantization table. Then, we Let:
compute the number of non-zero coefficients as the x: the luminance sensitivity in fuzzy set;
frequency sensitivity. membership of L, μ ( L) .
Our FIS can take account of human knowledge y: the frequency sensitivity in fuzzy set;
in HVS. The human visual perception of luminance membership of F, μ ( F ) .
and frequency can be represented by a number of z: the inference result.
fuzzy-set values. From these fuzzy representations, A1 : “DARK” in the fuzzy set.
the FIS characterizes the function of how to control A2 : “BRIGHT” in the fuzzy set.
the transparency. That depends on the transform of B1 : “SMOOTH” in the fuzzy set.
image sensitivity to fuzzy associations. B2 : “ROUGH” in the fuzzy set.
2 Watermark embedding C1 : “SMALL” in the fuzzy set.
The watermark is a sequences of random
number that length is n and have the normal C2 : “MODERATE” in the fuzzy set.
distribution N(0,1), i.e., W wi ,0 i n. Three C 3 : “LARGE” in the fuzzy set.
random numbers of the watermark sequences are Then the basic HVS knowledge can be
embedded in low frequency coefficients of each described as IF-THEN rules in the inference
block. system as follows:
The watermark embedding process is given , ,
in Fig. 2. The original image is decomposed into INPUT: x is A AND y is B
non-overlapping 8x8 blocks, and the DCT is R1 : IF x is A1 AND y is B1 ,
performed for every block. Then, the luminance
sensitivity and frequency sensitivity are computed THEN z is C1 .
as the input of FIS. The transform function R 2 : IF x is A1 AND y is B2 ,
between sensitivity and membership is sigmoid
function. Consider a fuzzy association for THEN z is C2 .
intelligent inference of an adaptive watermark. R 3 : IF x is A2 AND y is B1 ,
watermark THEN z is C2 .
R 4 : IF x is A2 AND y is B2 ,
original block DCT watermark
image decomposition embedding THEN z is C 3 .
,
CONCLUSION: z is C .
FIS
We use the centroid method to defuzzify the
inference results in the defuzzifier process. The
output α k ’s of FIS is used to as the weights of
watermarked inverse the watermark.
block DCT
image
decomposition 3. Watermark detection
The watermark detection process is given
Fig. 2. Watermark embedding process. in Fig. 3. The weights α k ’s are again
The FIS rules fo basic knowledge are: computed from the original image by
convolving the same FIS as that used in the
Rule1: If the image is dark and smooth, then
keep the amount of embedding watermark embedding process. Then, the
original image and corrupted images are
information small.
transformed using the DCT. The embedded
Rule2: If the image is dark and texture, then
coefficients are subtracted and divided by the
keep the amount of embedding
information moderate. weights α k ’s to extract the corrupted
Rule3: If the image is bright and smooth, then watermark. The watermark detection process
― 320 ―
can be described as: embedding watermark defenses the
Dk X k X k ,
*
(1) distortion, so it is robust.
w ( Dk / k ) ,
*
(2)
k
watermark
Fig. 3. Watermark detection process.
― 321 ―
scheme based on the human visual model
and the fuzzy inference system is proposed.
By using the human visual model, the
watermark can be adapted to different
images that provide a maximum and suitable
power watermark subject to the
imperceptibility constraint.
The main contributions of our adaptive
watermark scheme are that it provides the
advantage of fuzzy logic inference that
extracts the human’s intelligence. And it
applies the adjustment of watermark
strength smoother and more compatible to
the variation of human visual model. The
capacity of the watermark can be larger, and
it is hence more robust and imperceptible.
References
― 322 ―