• 沒有找到結果。

Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet

N/A
N/A
Protected

Academic year: 2021

Share "Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet"

Copied!
10
0
0

加載中.... (立即查看全文)

全文

(1)

Parameterized Integer Wavelet

Xiaoyun Wu1, 2, Jiwu Huang1,*, Junquan Hu1 , and Yun-Qing Shi3

1

School of Information Science and Technology, Sun Yat-Sen University Guangzhou, 510275, P. R. China

isshjw@mail.sysu.edu.cn

2

School of Information Science, Guangdong University of Business Studies Guangzhou, 510320, P. R. China

3

Department of Electrical and Computer Engineering, New Jersey Institute of Technology Newark, NJ 07102, USA

Received 28 April 2006; Revised 12 May 2006; Accepted 13 June 2006

Abstract. With the tremendous amount of images distributed over Internet, image authentication has drawn extensive attention for integrity verification. For instance, watermarking fragile to malicious modifications while robust to data compression has been proposed for image authentication. However, the security of wa-termark has not received enough attention yet. In this paper, we propose a secure semi-fragile wawa-termarking scheme for image authentication based on integer wavelet transform with parameters. The features of the pro-posed scheme are as follows. Firstly, parameterized integer wavelet transform is adopted. The wavelet base is chosen by a parameter. It is impossible to extract the watermark without the exact parameter and thus the se-curity of the watermark is guaranteed. Secondly, the performance of the generated watermark is improved and the computational complexity is reduced due to the lifting scheme used in the proposed framework of param-eterized integer wavelet transform. Thirdly, the proposed watermark can tolerate JPEG lossy compression to a quality factor as low as 40, while being sensitive to malicious attack and able to locate the tampered area ac-curately. Experimental results demonstrate the merits of the proposed algorithm.

Keywords: semi-fragile watermark, watermark security, image authentication, integer wavelet transform, parameterization

1 Introduction

Digital multimedia has been widely distributed via Internet and broadcasting nowadays. This leads to an acute need for media authentication because the digital contents can be easily edited or modified by using some readily available software tools. As a new tool for content authentication, digital watermarking has been drawing consid-erable attention and becoming an active research area.

Digital watermark can be classified as robust, fragile and semi-fragile [1]. The robust watermark survives even when the watermarked digital content has been severely attacked and thus can be applied to copyright protection. On the other hand, the fragile watermark will be destroyed even if the change in the marked digital media is mi-nor and thus can be used for data integrity verification. Offering a tradeoff between robustness and fragility, semi-fragile watermark that can resist content-preserving operations (such as data compression within a reason-able extent) while being sensitive to content-altering manipulations (such as feature replacement) is more practi-cable for content integrity verification.

Many fragile and semi-fragile watermarking schemes based on DWT (discrete wavelet transform) have been reported during the past years. Kundur et al. [2] suggested to embed watermark in the selected wavelet coeffi-cients via quantization. Tamper detection at multi-resolution had been achieved. But it is not consistent with characteristics of the HVS (human visual system) [3] and brings perceptible distortion to the watermarked images. Inoue et al. [4] embedded fragile watermark by thresholding and quantizing wavelet coefficients at the coarser scales and gave a measurement for tamper proofing. Yu et al. [5] modeled the changes of DWT coefficient

(2)

電腦學刊 第十七卷第二期(Journal of Computers, Vol.17, No.2, July 2006)

caused by tamper as Gaussian distribution. Malicious tamper has large variance while incidental tamper has small variance. They embedded mark via modulating the mean of some coefficients instead of individual coeffi-cients.

Most of these conventional DWT-based fragile and semi-fragile watermarking schemes reported in literature have the following three shortcomings. i) Vulnerability to attack. The schemes use only one wavelet base to per-form the DWT. Once the algorithm is open to public, the hidden inper-formation bits may be exposed or modified easily by an attacker. ii) Low robustness to JPEG compression. Almost all of the existing fragile watermark can-not resist JPEG compression with the quality factor lower than 70. iii) High computational complexity. Though the conventional DWT needs less computational cost as compared with DCT (discrete cosine transform), it may be time consuming to perform the DWT on a whole image with large size.

To improve watermark security, Kundur et al. [2] used a random triple to select the embedding region. How-ever, it may weaken the ability to tamper detection and tamper localization. Unfortunately, the security of fragile watermarking techniques has not received sufficient attentions so far. A feasible method to enhance security is to choose a wavelet base from a set of appropriate wavelet bases with parameters. If the parameter space is large enough, then it will be difficult for an attacker to obtain the useful information to attack, thus guaranteeing high security. Based on this idea, Dietl etc. [6-7] proposed to use secret, key-dependent parametric wavelet filters to improve the security of robust watermarking schemes. However, their methods are based on conventional DWT.

Lifting scheme, as the second generation of wavelet transform, has effectively enhanced the processing speed. IWT (Integer wavelet transform) allows constructing reversible wavelet transform to decrease round-off errors which have important impact on the fragile watermark. By using lifting scheme, we can implement IWT effi-ciently.

In this paper, we propose a secure semi-fragile watermarking scheme for image authentication based on pa-rameterized IWT. It incorporates parameterization and IWT based on lifting scheme to achieve high security and low computational complexity. The semi-fragile watermarking algorithm is presented by applying the parameter-ized integer wavelets. Analysis and experimental results demonstrate that the proposed watermarking scheme is secure and capable of locating the tampering accurately, while it is robust to JPEG lossy compression as the qual-ity factor low as 40.

This paper is organized as follows. In Section 2, we review the lifting scheme briefly and then adopt a special scheme to parameterize the conventional 9-7 biorthogonal filter bank using lifting scheme, thus constructing the parameterized IWT. Section 3 describes the design of the proposed semi-fragile watermarking algorithm, includ-ing preprocessinclud-ing of a binary image, watermark embeddinclud-ing/extraction and tamper detection. In Section 4, we analyze the security and computational complexity of the proposed scheme. In Section 5, we present the experi-mental results. Finally, conclusions are drawn in Section 6.

2 Parameterized Integer Wavelet Transform

Cohen et al. [8] proposed a technique named lifting scheme to construct fast and concisely transform steps for wavelet transform. From then on, the lifting scheme has received more and more attention as it can offer not only fast transform, but also “you can construct your owner wavelet at home” [9]. Theoretically, lifting scheme is designed based on the matrix algebra theory and phase filter bank theory such as perfect reconstructed filter bank theory. Generally, lifting scheme includes three steps: splitting, prediction, and update [10].

It has turned out that every FIR (Finite Impulse Response) wavelet or filter bank can be decomposed into ing steps [10]. The number of lifting steps is bounded by the length of the original filters. It is noted that the lift-ing factorization is not unique. Dependlift-ing on the application, one may choose the factorization with the smallest number of steps, or the one that preserves symmetry.

An example of the lifting scheme with CDF 9-7 biorthogonal wavelet [10] is given below. To a prefixed one-dimensional signal

{ }

xl l Z∈ , the lifting steps are described as following:

(0) 2 (0) 2 1 l l l l s x d x +  =   =  (1) (0) (0) (0) 1 (1) (0) (1) (0) 1 ( ) ( ) l l l l l l l l d d s s s s d d

α

β

+ −  = + +   = + +  (2) (1) (1) (1) 1 (2) (1) (2) (2) 1 ( ) ( ) l l l l l l l l d d s s s s d d

γ

δ

+ −  = + +   = + +  . (1) (2) (2) l l l l s s d d ζ ζ  =   =  . (2) α=-1.586134342; β=-0.05298011854; γ=0.8829110762; δ =0.4435068522; ζ =1.149604398. (3)

(3)

where s and l d are commonly referred to as lower frequency and detail coefficients, respectively, and l ( )i l s , ( )i l

d are called mid-output.

In practical application, it may be more convenient to have only one parameter. According to the correspond-ing theory, five parameters in Equation (1)∼(3) can be expressed by only one parameter α. For the sake of brev-ity, we will not describe the theory in detail here. Interested readers may refer to literatures, say, Zhong et al. [11] for more detailed description. The formulae that use α to expression the rest of parameters are listed below:

2 2 4 2 1 4(1 2 ) 1 4 4 1 4 1 2 4 1 8 (4 ) 16 (1 2 ) (1 2 ) 2 2(1 2 ) 1 4 β α α α γ α α α δ α α α ζ α  = −  +   − − − =  +  +  = − +  + +  +  =  +  . (4)

The corresponding filter coefficients can be expressed in terms of αas:

3 2 0 2 3 2 1 2 2 2 3 2 2 4 2 2 184 266 125 20 16 (1 2 ) (1 4 ) 2 128 152 58 5 32 (1 2 ) (1 4 ) 2 3 4 8 1 4 2 8 6 3 32 (1 2 ) (1 4 ) 2 (8 6 3) 32 (1 2 ) (1 4 ) h h h h h

α

α

α

α

α

α

α

α

α

α

α

α

α

α

α

α

α α

α

α

α

 + + + =  + +   + + +  = + +   − +  =+   + + =  + +   + +  =  + +  0 1 2 2 3 2 (8 3) 8 (1 2 ) 2 9 4 16 1 2 2 1 16 1 2 2 16 1 2 g g g g α α α α α α α  + =  +   +  =  +   =+   − =  +  . (5)

The low pass and high pass filter banks in the CDF 9-7 wavelet, denoted by

{

h h h h h h h h h4, 3, 2, ,1 0, ,1 2, 3, 4

}

and

{

g g g g g g g3, 2, 1, 0, 1, 2, 3

}

, can thus be parameterized by selecting different α

values.

To make the filter banks achieve perfect reconstruction, however, the value of parameter α should not be chosen arbitrarily. Note that, the rational range of the parameter α has not been derived in [11]. According to the conditions listed in [11], we have derived the rational range for the parameter α by ourselves. That is

( 3, 1.2)

α∈ − − . The derivation is given in Appendix.

According to IWT theory [12], we can construct parameterized IWT based on the framework mentioned above. That is,

(0) 2 (0) 2 1 l l l l s x d x +  =   =  (1) (0) (0) (0) 1 (1) (0) (1) (0) 1

( (

))

( (

))

l l l l l l l l

d

d

Int

s

s

s

s

Int

d

d

α

β

+ −

=

+

+

=

+

+



(2) (1) (1) (1) 1 (2) (1) (2) (2) 1 ( ( )) ( ( )) l l l l l l l l d d Int s s s s Int d d

γ

δ

+ −  = + +   = + +  . (6) (3) (2) 2 (2) (3) (2) (3) (( ) ) (( 1 ) ) l l l l l l d d Int s s s Int d

ζ ζ

ζ

 = + −   = + −  (4) (3) (3) ( 4) (3) (4) (( 1) ) l l l l l l d d Int s s s d

ζ

 = + −   = +  (4) (4) l l l l s s d d  =   =  . (7)

whereInt x means taking the integer part of x . Replacing the parameters ( ) β, γ , δ , ζ with α using Equation (4), we then have parameterized IWT. Equation (7) is an extra lifting step different from Equation (2). We adopt it here because it can achieve reversible transform according to [12] while Equation (2) cannot.

(4)

電腦學刊 第十七卷第二期(Journal of Computers, Vol.17, No.2, July 2006)

3 The Proposed Scheme

In this section, the proposed scheme is described.

3.1 Watermark Preprocessing

Without loss of generality, assume the watermark W is a binary image of size M×N , W =w i j( , ), and thePN denotes a binary pseudorandom matrix of size M×N, generated by a secret key k , PN = p i jn( , ).

We generate the ultimate hidden watermark W by using Equation (8). *

W*=W⊕PN . (8)

where ⊕ denotes the exclusive OR operation. 3.2 Watermark Embedding

As mentioned in Section 1, semi-fragile watermark should be robust to incidental modification and fragile to malicious tamper. Moreover, to an invisible semi-fragile watermark, it should have the following features: i) Perceptual invisibility; ii) Ability to detect and locate maliciously tampered areas in a modified image. From the definition of the watermark signal, it is clear that to ensure the robustness and the fragility described above, the embedding strength and bitrate of the watermark should be as large as possible. However, this will lead to a de-crease of perceptual invisibility. Therefore a compromise is required here. That is, the embedding strength, em-bedded bitrate and embedding region should be selected carefully.

In this paper, we propose a watermarking scheme based on parameterized IWT. Suppose that an image is de-composed by j-level IWT. It produces 3*j detail subbands and a low frequency subband LLj. Compared to other

detail subbands, the coefficients in LLj subband have the following features: i) They will be well preserved after

common signal processing such as JPEG compression. ii) They have larger perceptual capacity so as to ensure invisibility of the watermarked image after embedding a watermark with certain strength. Therefore, LLj subband

is proposed for watermark embedding. We choose j to be three in our work.

We use the scheme presented in [13] to embed the watermark W , defined in Equation (8), in the LL* 3

sub-band. It guarantees some robustness of watermark.

Let C_LFB a denote the five least significant bits of a , ( ) R LFB a d represent the substitution of the five _ ( , ) least significant bits of a with d . The bit embedding in an IWT coefficient in the LLj is described below.

If w* ( , )i j = 1 _ ( ( , ) 01000 ,11000 ) _ ( ( , )) 01000 * ( , ) _ ( ( , ),11000 ) otherwise R LFB f i j b b C LFB f i j b f i j R LFB f i j b − ≤  =   . (9) If w* ( , )i j = 0 _ ( ( , ) 10000 , 01000 ) _ ( ( , )) 11000 * ( , ) _ ( ( , ), 01000 ) otherwise R LFB f i j b b C LFB f i j b f i j R LFB f i j b − ≥  =   . (10)

where f i j and ( , ) f* ( , )i j are IWT coefficients located at ( , )i j in LL3 subband before and after embedding a

bit, and w* ( , )i j is a watermark bit of W to be embedded into ( , )* f i j . After data embedding, performing the inverse IWT on the modified wavelet coefficients, we can have the watermarked image.

3.3 Watermark Extraction

Three-level IWT is operated on a to-be authenticated image. Let f i j denote an IWT coefficient located at '( , ) ( , )i j in LL3 subband.

(5)

* ( , ) 1 ( '( , )) 1 (1 , 1 ) 0 ( '( , )) 0 LFB f i j w i j i M j N LFB f i j =  = = ≤ ≤ ≤ ≤  . (11)

Using Equation (12), we can obtain the watermark W , ' W'=w i j'( , ) (1≤ ≤i M, 1≤ ≤j N). w i j'( , )=w* '( , )i j ⊕p i jn( , ) (1≤ ≤i M, 1≤ ≤j N) . (12)

It is obliviously that the extraction of watermark does not require the original image.

3.4 Tamper Detection

We use D denoting the difference image of size M×N, D d i j . It is the difference between the original and = ( , ) extracted watermark and is expressed in Equation (13):

D= W−W' . (13)

When a watermarked image suffers from incidental attacks, most of the watermark error pixels are isolated points on the difference image. On the contrary, most of the watermark error pixels resulted from malicious at-tacks are gathered together with a high probability.

Based on the difference image, both the subjective evaluation and the objective evaluation are used for tamper detection. By observing if the watermark error pixels are dense or sparse in the extracted watermark, we can distinguish malicious attack from incidental changes. If it is malicious attack, we can further identify the tam-pered area and the degree of tamper. To be objective, a quantitative metric is given as follows.

For a watermark error pixel in the difference image D, it is a dense pixel if at least one of its eight neighbor pixels is an error pixel. Otherwise, it is a sparse pixel. Thus, we define the following parameters.

areadense =

{

The total number of dense pixel in the difference image D

}

. (14) areasparse =

{

The total number of sparse pixel in the difference image D

}

. (15) area=

{

The total number of pixel in the difference image D

}

. (16)

area

total

=

area

dense

+

area

sparse . (17)

area

total

area

λ

=

, dense total

area

area

η

=

. (18)

Now, we can evaluate whether a modification is malicious or incidental objectively by using the following rules:

If λ =0, then the tested image is not altered.

If λ >0andη τ< , where the threshold τis selected carefully (generally, we fix it between 0.5 and 1), then the tested image in this category then experiences incidental distortions.

If η τ≥ , then the tested image is maliciously tampered.

4 Performance Analysis

In this section, the performance is analysed.

4.1 Security

Kerckhoff stated that the security of an encryption system must lie in the choice of a key, not the algorithm used to for encryption [14]. It may be applicable to the security of digital watermarking as well.

To test the sensitivity of the parameter’s change, we use four standard images Lena, Baboon, Peppers and Boat (512×512×8 bits). We test our algorithm at 31 different embedding parameters, obtained from [-2.85, -1.35]

(6)

電腦學刊 第十七卷第二期(Journal of Computers, Vol.17, No.2, July 2006)

at interval of 0.05. That is, α ∈ −

{

2.85, 2.8,..., 1.5, 1.45, 1.4, 1.35− − − − −

}

. We select the parameter whose differ-ence as compared to the embedding parameter is 10-15 to extract the watermark. We cannot extract any useful information even if the difference between the embedding and the extracting parameter is as small as 10-15. We get the similar results for the four images. To the limited length of the article, we only demonstrate the results of Lena in Fig. 1. Fig. 1(a) is a watermarked Lena image using the proposed method, in which the parameter α used is 1.500000000000000. During the hidden data extraction, the parameter 1.500000000000000 and -1.500000000000001 are used, respectively. Fig. 1(b) shows the correctly extracted data, which is the logo com-posed of Chinese characters. Fig. 1(c) indicates what has been extracted using a wrong parameter, i.e., the second parameter, -1.500000000000001, which is only differ by the first (correct) parameter by 0.000000000000001, an extremely small difference. It shows that our scheme is very sensitive to the parameter’s change, and it is ex-tremely difficult to acquire the exact embedding parameter, hence it is secure enough for many applications. It is vain for the attackers to get some useful information about the algorithm without knowing the exact parameter used in data embedding. Furthermore, the rational range of the parameter is (-3, -1.2), meaning that there are many real numbers of rational parameters in it. Hence, it is practically difficult to search exhaustively the exact parameter.

(a) (b) (c)

Fig. 1. Security of the proposed method: (a) Watermarked image (α=-1.500000000000000 is used for embedding); (b) Extracted mark (64×64) with the correct parameter (α=-1.500000000000000);

(c) Extracted mark with a slightly different parameter (α=-1.500000000000001)

4.2 Computational Complexity

In Section 1, we have mentioned that the schemes based on the conventional DWT offer lower computational complexity than those based on DCT. Given a signal with length n, the computational load of DWT and DCT may be expressed as O n( ) and O n( log( ))n , respectively. For conventional 9-7 DWT, 14 floating-point addi-tions and 16 floating-point multiplicaaddi-tions should be used for two wavelet coefficients. In the proposed scheme in this paper, the parameterized 9-7 IWT is constructed by using lifting scheme. According to Equation (6)∼(7), our parameterized 9-7 IWT only needs 12 integer additions, 7 floating-point multiplications and 7 round-off opera-tions. As compared with the conventional 9-7 DWT, almost half of the computational cost will be saved. More-over, since all of the wavelet coefficients are all with integer form, hence, the algorithm is easily to be realized by hardware.

5 Experimental Results

We have tested our scheme on the “Lena” and “Baboon” images (both of 512×512×8 bits). In our work, we choose a three-level IWT since it has been enough for us to embed the selected watermark signal. The embedding parameter α is -1.500000000000000. The PSNR of the watermarked Lena and Baboon images are 42.26 dB and 42.11dB respectively, as shown in Fig. 2. The watermarks are perceptually invisible. Fig. 3(a) shows the ex-tracted watermarks from the marked image that has been compressed by JPEG at different quality factors. We can see that the proposed scheme can resist JPEG compression when the quality factor is as low as 40, while the JPEG compression with a quality factor smaller than 40 should be considered as serious distortion. In order to justify the performance of the proposed scheme, we compare its robustness to JPEG with that in [15]. Fig. 3(b)

(7)

posed scheme is more robust against JPEG compression than that in [15]. Fig. 4 demonstrates the fragility of our proposed scheme to malicious tamper. Furthermore, the proposed scheme can locate the tamper areas when mali-cious tamper takes place. Fig. 4(a) and Fig. 4(d) depicted two differently tampered Lena images. Fig. 4(b) and Fig. 4(e) show the extracted data, from which the malicious tampering are detected. Fig. 4(c) and Fig. 4(f) are the difference images between the hidden data and the extracted data, from which the tamper areas have been located.

(a) (b)

(c) (d)

Fig.2. Invisibility: (a), (c) The original Lena and Baboon images; (b) The watermarked Lena image (42.26 dB); (d) The watermarked Baboon image (42.11 dB)

(a)

(b)

Fig.3. The mark extracted from the watermarked image that has been compressed by JPEG with different quality factor: (a) Our scheme. (80, 70, 60, 50, 40); (b) Scheme in [15]. (80, 70, 60, 50).

(8)

電腦學刊 第十七卷第二期(Journal of Computers, Vol.17, No.2, July 2006)

(a) (b) (c)

(d) (e) (f)

Fig.4. Tampered image; (b),(e) Tampered watermark; (c),(f) Difference image

5 Conclusions

In this paper, we propose a secure semi-fragile watermarking for image authentication based on a parameterized IWT. Compared with the existing DCT-based or DWT-based fragile and semi-fragile watermarking schemes, the proposed scheme has lower computational complexity due to IWT via lifting scheme. The appropriate watermark cannot be extracted without knowing the exact parameter owing to the usage of parameterized IWT and thus the security of the watermark is greatly enhanced. A quantitative measure that distinguishes malicious attack from accidental modification is also given in this paper. In addition, tamper detection can be observed by the extracted watermark due to the use of a meaningful binary image as the watermark. Experiments demonstrate the security of the watermark and show that the proposed method is capable of detecting tamper accurately while tolerating JPEG lossy compression to a large extent. It is practical in content authentication system.

6 Acknowledgement

Authors appreciate, respectively, the support received from NSF of China (60325208, 90604008), NSF of Guangdong (04205407), New Jersey Commission of Science and Technology via NJWINS.

References

[1] I. J. Cox and M. I. Miller, “The first 50 years of electronic watermarking,” Journal of Applied Signal Processing, 2002, No.2, pp.126-132.

(9)

[2] D. Kundur and D. Hatzinakos, “Towards a telltale watermark techniques for tamper-proofing,” Proc of IEEE Int. Conf. on Image Processing, 1998, Vol.2, pp.409-413.

[3] B. Watson and G. Y. Yang, “Visibility of wavelet quantization noise,” IEEE Trans. on Image Processing, Vol. 6, 1997, pp.1164-1175.

[4] H. Inoue, A. Miyazaki and T. Katsura, “Wavelet-based watermarking for tamper proofing of still images,” Proc. Int. Conf. on Image Processing, Vol. 2, 2000, pp. 88-91.

[5] G. Yu, C. Lu, Y. Liao and J. Sheu, “Mean quantization blind watermarking for image authentication,” Proc of IEEE Int. Conf. on Image Processing, Vol. 3, 2000, pp.706-709.

[6] W. Dietl, P. Meerwald, A. Uhl., “Key-dependent pyramidal wavelet domains for secure watermark embedding,” Security and Watermarking of Multimedia Contents V, Vol.5020, 2003, pp.728~739.

[7] W. Dietl, P. Meerwald, A. Uhl., “Protection of wavelet-based watermarking systems using filter parameterization,” Signal Processing, Vol.83, No.10, 2003, pp.2095~2116.

[8] A. Cohen, I. Daubechies, J. C. Feauveau, “Biorthogonal bases of compactly supported wavelets,” Communications on Pure and Applied Mathematics, XLV, 1992, pp.485 - 560.

[9] W. Sweldens and P. Schrder, “Building your own wavelets at home,” Wavelets in Computer Graphics, ACM SIGGRAPH Course Notes, 1996, pp.15-87.

[10] I. Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” Journal of Fourier Analysis, Vol.4, No.3, 1998, pp.245-267.

[11] G. Zhong, L. Cheng, H. Chen, “A simple 9/7-tap wavelet filter based on lifting scheme,” Proc of IEEE Int. Conf. on Image Processing, Vol. 2, 2001, pp.249-252.

[12] R. Calderbank, I. Daubechies, W. Sweldens and B. Yeo, “Wavelet transforms that map integers to integers,” Journal of Applied and Computational Harmonic Analysis, No.5, 1998 pp.332-369.

[13] H. Liu, J. Liu, J. Huang, D. Huang and Y. Q. Shi, “A robust DWT-based blind data hiding algorithm,” Proc. of IEEE Int. Sym. on Circuits and Systems, Vol. 2, 2002, pp.672-675.

[14] J.L. Massey, “Contemporary cryptology: An introduction,” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, Ed. New York: IEEE Press, 1992, pp.3-39.

[15] J. Hu, J. Huang, D. Huang, Y. Q. Shi, “Image fragile watermarking based on fusion of multi-resolution tamper detec-tion,” IEE Electronics Letters, Vol.38, No.24, 2002, pp.1512-1513.

Appendix:

Let the analysis low-pass symmetric filter and synthesis symmetric low-pass filter be

=

+

=

1 1 0

2

cos

)

(

L n n

n

h

h

H

ω

ω

. (A1)

=

+

=

2 1 0

2

cos

)

(

L n n

n

g

g

G

ω

ω

. (A2)

(10)

電腦學刊 第十七卷第二期(Journal of Computers, Vol.17, No.2, July 2006) Theorem 1: Suppose

)

(

)

2

1

(

2

)

(

ω

ω

ω

F

e

H

N i −

+

=

. (A3)

)

~

(

)

2

1

(

2

)

(

ω

~

ω

ω

F

e

G

N i −

+

=

. (A4)

where

F

(

ω

)

and

F

~ ω

(

)

are polynomials about

e

−iω. Then

H

)

and

G

)

can construct biorthogonal wave-let, if it meets the following requirements.

i)

H

(

0

)

= G

(

0

)

=

2

; ii) [ ) 1 2 , 0

2

)

(

sup

− ∈

<

N

F

ω

π ω , [ ) 1 ~ 2 , 0

2

)

(

~

sup

− ∈

<

N

F

ω

π ω ; iii)

H

(

ω

)

G

(

ω

)

+

H

(

ω

+

π

)

G

(

ω

+

π

)

=

2

.

To design the desired 9-7 biorthogonal wavelet, let

L

1

=

4

,

L

2

=

3

,

N

=

2

,

N

~

=

4

. Then combining Equations

A1-A4, we get 4 3 4 2 3 4 1 2 3 4

( )

2 2(2 * (

cos(3 ) (

2 ) cos(2 )

(

2

3 ) cos( )) (

2

3

4 )

i

)

F

h

h

h

h

h

h

h

h

h

h e

ω

ω

ω

ω

ω

=

+

+

+

+

+

. (A5)

F

~

(

ω

)

=

8

2

(

2

*

g

3

cos(

ω

)

+

(

g

2

+

4

g

3

)

e

2iω

)

. (A6) According to condition ii), we then have

F

~

(

ω

)

<

8

. (A7)

F

( )

ω

<

2

. (A8)

數據

Fig. 1. Security of the proposed method: (a) Watermarked image ( α =-1.500000000000000 is used for embedding);

參考文獻

相關文件

This kind of algorithm has also been a powerful tool for solving many other optimization problems, including symmetric cone complementarity problems [15, 16, 20–22], symmetric

 Local, RADIUS, LDAP authentication presents user with a login page.  On successful authentication the user is redirected to

(Another example of close harmony is the four-bar unaccompanied vocal introduction to “Paperback Writer”, a somewhat later Beatles song.) Overall, Lennon’s and McCartney’s

It is based on the goals of senior secondary education and on other official documents related to the curriculum and assessment reform since 2000, including

Carve if not photo- -consistent consistent Project to visible input images Project to visible input images. Multi-pass

Carve if not photo- -consistent consistent Project to visible input images Project to visible input images.. Multi-pass

It is interesting to discover that the golden ratio  appears not only in the fluid sink and heat source induced maximum ground surface horizontal displacements, but also on

Therefore the existing transportation system has not been considering the characteristics of female users.This is an original study trying to investigate the differences