• 沒有找到結果。

Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain

N/A
N/A
Protected

Academic year: 2022

Share "Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain"

Copied!
9
0
0

加載中.... (立即查看全文)

全文

(1)

Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and

Synchronization of Peak Locations in DFT Domain

Yen-Chung Chiu

Department of Computer and Information Science National Chiao Tung University

03-5131545, Hsinchu, Taiwan 300

gis91528@cis.nctu.edu.tw

Wen-Hsiang Tsai

Department of Computer and Information Science National Chiao Tung University

03-5728368, Hsinchu, Taiwan 300

whtsai@cis.nctu.edu.tw

ABSTRACT

The proposed method for copyright protection of color images against rotation and scaling attacks is described. The main idea is to embed a watermark as coefficient-value peaks circularly and symmetrically in the middle band of the DFT domain of an input image. Then, by detecting the peaks in the DFT domain, the embedded watermark can be extracted.

Keywords

watermarking, color image, rotation attack, scaling attack, DFT domain, peak location coding, synchronization peak, copyright protection.

1. INTRODUCTION

Digital watermarking is a technique for embedding a watermark into an image to protect the owner’s copyright of the image. The embedded watermark must be robust. The stego- image may be rotated or scaled by illicit users. It is desirable that after applying these operations on the stego-image, the watermark is not fully destroyed and can be extracted to verify the copyright of the image.

Many different watermarking techniques for copyright protection have been proposed in recent years. Watermarking techniques that are robust to rotation and scaling are mostly performed in the

frequency domain. O'Ruanaidh and Pun [1]

proposed the use of Fourier-Mellin transform- based invariants for digital image watermarking.

A public watermarking method based on the Fourier-Mellin transform and an extension of it based on the Radon transform was proposed by Wu, et al. [2]. In Lin, et al. [3] a watermark is embedded into a one-dimensional (1-D) signal obtained by taking the Fourier transform of the image, re-sampling the Fourier magnitudes into log-polar coordinates, and then summing a function of those magnitudes along the log-radius axis. Su and Kuo [4] proposed a spatial-frequency composite digital image watermarking scheme to make the embedded watermark survive rotation and scaling transformations. The frequency- domain watermark was embedded in the discrete Fourier transform coefficients. The spatial-domain watermarking is used to help recover the image to its original orientation and scale.

This paper is organized as follows. In Section 2, the idea of the proposed method will be described.

By certain properties of the DFT coefficients, we can embed a watermark in the DFT domain with robustness against rotation and scaling attacks. In Section 3, the proposed watermark embedding process is presented. In Section 4, the proposed watermark extraction process is described. In Section 5, some experimental results are illustrated. Finally, in Section 6 some discussions

(2)

and a summary are given.

2. Idea of Proposed Method

2.1 Properties of Coefficients in DFT Domain After applying a discrete Fourier transformation (DFT) to an input image, the DFT coefficients in the frequency domain can be obtained. The DFT of an image f( yx, ) of size M ×N can be described by the equation described below:

=

+

=

=

1 0

) / / ( 1 2

0

) , 1 (

) ,

( N

y

N vy M ux M j

x

e y x MN f

v u

F π (2.1)

The Fourier transform is a complex function of the real frequency variables. It has several properties, and some of them are described in the following.

A. Symmetry property

If a 2D signal is real, then the Fourier transform has a symmetry property, as shown by the following equation [5]:

) , ( ) ,

(u v F u v

F = − − . (2.2)

The symbol () indicates complex conjugation.

Because the Fourier transform of an image can be complex, we can divide it into two functions. One is the magnitude function or spectrum

21

)]

, ( ) , ( [

| ) , (

|F u v = R2 u v +I2 u v , and the other the

phase function

 

=

) , (

) , tan (

) ,

( 1

v u R

v u v I

φ u , where

) , ( vu

R and I( vu, ) are the real and imaginary parts of F( vu, ). And for real signals, Equation (2.2) leads to:

| F(u, v) | = | F(−u, −v) |. (2.3) It means that the magnitude value of a coefficient (or simply a coefficient value) and its symmetric version are equal. In addition, both the magnitude and the phase functions are necessary for complete reconstruction of an image from its Fourier transform. But the magnitude part is less important than the phase part. The magnitude- only image is unrecognizable. On the contrary, the

phase-only image is barely recognizable [6].

Therefore, we may calculate and adjust the magnitude values of the DFT coefficients to embed information without causing significant loss of image quality.

B. Invariant properties of rotation and scaling After we apply some image processing operations like rotation and scaling to an image, the coordinates and magnitude values of the DFT coefficients of the image will be altered, too.

Changes of the DFT coefficients after scaling and rotation operations in the discrete image domain are listed in Table 1 [7]. The scaling operation has almost no effect on the DFT coefficients. It means that when an image is scaled, each DFT coefficient is the same as the original one except only with some noise. On the other hand, after rotating an image in the spatial domain, the locations of the DFT coefficient values will have the same rotation in the DFT domain. Figures 1(a) and (b) show an original image and a rotated version of it. And the corresponding Fourier spectrum images, in which each pixel value is equal to the magnitude value of the DFT coefficient, are shown in Figures 1(c) and (d), respectively. Note that the Fourier spectrum image in Figure 1(d) has the same rotation like Figure 1(b).

Table 1. Changes of DFT coefficients after operations in discrete spatial domain.

Operations Scaling Rotation Changes of DFT

coefficients Almost no effect Rotation

(a) (c)

(3)

(b) (d)

Figure 1 Input images, and Fourier spectrum images of G channel. (a) Image “Lena”. (b) Image “Lena”

after rotation. (c) Fourier spectrum image of image “Lena” (d) Fourier spectrum image with the same rotation angle of (b).

2.2 Properties of Color Channels

A full-color image has three color channels, namely, red (R), green (G), and blue (B).

Generally speaking, we can embed watermark information into all of these three channels.

However, human eyes are less sensitive to the frequency of blue color. And its greatest sensitivity is distributed over the region of the yellow/green frequency [8]. In addition, according to experiments, a watermark can be embedded into both red and blue channels in the DFT domain without creating perceivable effects. On the contrary, hiding information in the green channel is too sensitive to human vision. If we embed the watermark in the DFT domain of the green channel, the stego-image will appear to include obvious reticular effects.

2.3 Proposed Technique for Coding Peak Locations for Watermarking

In the proposed method, after the zero frequency point F(0,0) is shifted to the center of the transform domain, a watermark is embedded in a ring region which covers a middle band in the frequency domain between two circles with radiuses R1 and R2, with R1< R2, as shown in Figure 2. The middle band of the DFT domain is divided into n equally-spaced concentric circles, each with a radius r ∈ R = {r1, r2,, rn} and into m angle ranges with each range starting at a direction θ ∈ Θ = {θ1, θ2, , θm}, as seen in

Figure 3. Then, an embeddable position pk ∈ P = {p1, p2,  , pl}, where the coefficient value is adjusted to be a peak, is selected to be located at (xk, yk) described by:

(xk, yk) = (ricosθ j, risinθj) (2.4) where 0<i<n, 0<j<m and 0<k<l = n×m.

In addition, we already know that the DFT of a real image has the complex conjugate property (2.2), and that the coefficient values have the symmetric property (2.3). Furthermore, when conducting a watermarking work by changing the coefficient values, we must preserve the positive symmetry [9] in the following way:

| F(u, v) |  | F(u, v) | + δ

| F(−u, −v) |  | F(−u, −v) | + δ (2.5) where δ is a pre-selected constant. This means that if the value of an embeddable position is changed, the coefficient value of the symmetric location must also be adjusted with the same amount in the mean time.

In the proposed method, let M(u, v) be a coefficient value, which equals | F(u, v) | and M′(u, v) be the modified value. A watermark W is taken to be a serial number in this study and it is converted into a bit stream W = w1w2wK, which we call a watermark bit stream, with bit length K.

Then, when conducting the watermarking work, the value of M′(u, v) is modified to be a peak by the following equation:

wi

c v u M v u

M (' , )= ( , )+ × (2.6) where c is a pre-selected factor that determines the embedded watermark strength and wi is the i- th bit value (1 or 0) of W, called a watermark bit.

During watermarking, because of the property of the DFT coefficients specified in (2.5), we must select a pair of coefficients at (xk, yk) and (−xk, −yk) and adjust them to be peaks simultaneously.

Otherwise, a peak will be counteracted by the symmetric coefficient value after applying the inverse DFT. In addition, if a watermark bit wk

equals “1,” the coefficient values of the corresponding embeddable location (xk, yk) and its

(4)

symmetric location (−xk, −yk) are adjusted in this study to be peaks to embed the watermark bit by Eq. (2.6). On the contrary, if wk equals “0,” the values of the coefficient pair are not changed.

R1 R2

Figure 2 A ring region of middle frequency band.

R A (xk, yk)

Figure 3 The ring region divided into concentric circles and into angular sectors.

2.4 Proposed Technique for Synchronizing Peak Locations for Protection against Rotation and Scaling Attacks

In order to deal with rotation and scaling attacks, an extra peak Psyn is used in this study to synchronize the peak locations and is embedded into the middle frequency band of the DFT domain at the location described as follows:

Psyn (x, y) = (rcosθori,rsinθori) (2.7) where r is selected to be larger than R2 and θ is ori a pre-selected constant. We adjust the magnitude M of Psyn to be M'=M +c, where c is a constant mentioned previously.

In the watermark extraction process, we use Psyn to calculate the rotated angle of a tampered image which suffered from a rotation attack.

Because of the DFT property shown in Table 2.1,

if a stego-image is rotated, the location of Psyn is changed with the same angle of rotation. We calculate the new angle θ'ori of Psyn. The difference ∆ between θ θ and 'ori θ can be use ori

to decide whether the stego-image has suffered from a rotation attack. Then, The angles θ of 'k

the remaining peaks are obtained. Finally, we use θ

∆ and θ to reconstruct the original angles 'k θ ''k

of the remaining peaks by the following equations:

'k

θ =' θ −'k ∆ . θ (2.8) In addition, according to the DFT property shown in Table 1, if an image is scaled, the coefficient values of the DFT domain are almost unaffected.

It means that the radiuses of the peaks will not be changed.

3. Watermark Embedding Process

As mentioned previously, a watermark used for image ownership protection is assumed to be a serial number in this study, and the watermark is transformed into a watermark bit stream. In this section, the process of embedding a watermark bit stream in a color image will be described.

3.1 Embedding of Watermarks

In the proposed watermark embedding process, we use the two channels of red and blue to embed a watermark bit stream in the DFT domain according to the idea described in Section 2.2.

And the middle band area of the Fourier spectrum is divided into several concentric circles. Then, the watermark bit stream is embedded in the region of the concentric circles.

Furthermore, the watermark bit stream is divided into two halves to be embedded in the red and blue color channels, respectively. For either channel, the spatial domain is transformed into the frequency domain by the DFT. In the middle band of the DFT domain, locations that can be use to create peaks are decided according to the scheme described in Section 2.3. Then, we can get pairs of locations (xk, yk) and (−xk, −yk). Using the watermark bit stream W, if a bit wk of W equals

(5)

“1,” coefficient values of the corresponding embeddable positions (xk, yk) and (−xk, −yk) are adjusted to be peaks by Eq. (2.6) to embed a watermark bit. On the contrary, if wk equals “0”, the corresponding coefficient values are not changed. In addition, a synchronization peak is also embedded into the middle frequencies according to the scheme described in Section 2.4.

3.2 Detailed Algorithm

The inputs to the proposed watermark embedding process are a color image C and a watermark W.

The output is a stego-image S. The process can be briefly expressed as an algorithm as follows.

Algorithm 1: Watermark embedding process.

Input: A given color image C and a watermark W.

Output: A stego-image S.

Steps.

1. Transform the red and blue channels of C into the frequency domain by the DFT to get C’red and C’blue.

2. Transform W into binary form W = w1w2w2l with length 2l, and divide W equally into two parts Wred = w1w2wl and Wblue = wl+1w2l.

3. Embed Wred and Wblue into C’red and C’blue, respectively, by performing the following operations.

3.1 Decide n radiuses R = {r1, r2,, rn} of equally-spaced concentric circles in the middle band between two circles with radiuses R1 and R2, with R1< R2.

3.2 Decide m angles Θ = {θ , 1 θ ,, 2

θ } equally distributed in the range m

from 0 to ° 180 . Also, take l to be ° m× . n

3.3 Obtain l positions P = {p1, p2,, pl} with pk (k = 1, 2, …, l) located at (ricosθj, risinθj ) with k = (i 1)×m + j, and their l symmetric positions Q = {q1, q2,, ql} with qk

located at the symmetric location of

pk , where 1≤in, and 1≤ jm. 3.4 If the value of the watermark bit wk

equals 1, then adjust the pair of the coefficient values located at pk and qk to be peaks by Eq. (2.6), where

l k

1 .

3.5 Add a synchronization peak Psyn

according to the scheme described in Section 2.4.

4. Transform the C’red and C’blue back into the spacial domain by the inverse DFT.

5. Take the final result as the desired stego-image S.

4. Watermark Embedding Process

In the proposed watermark extraction process, no other information but the stego-image is needed as the input. The watermark can be extracted to verify the copyright. The processes of applying this technique will be described in this section.

And a detailed algorithm for the process will be given.

4.1 Extraction of Watermarks

In the proposed watermark extraction process, the red and blue channels of a stego- image are accessed. Each of these two channels is transformed into the DFT domain. Then, the peaks in the middle frequency band of the DFT domain are detected using a pre-selected threshold value T. If any DFT coefficient value M is larger than T, it is judged to be a peak. Because of the symmetric property of the DFT coefficient values specified in Eq. (2.3), we can only detect peaks within the range of the upper-half Fourier spectrum image. After collecting all the peaks, a detected peak with the longest radius is taken to be the synchronization peak, which is then used to synchronize the peak locations, and its angle θ 'ori is obtained. Then, we reconstruct the angles of the remaining h peaks in P = {p1, p2,, ph} by Eq.

(2.8) to get their new locations P' = {p'1, p'2,, p'h}.

Also, we separate the ring area of the middle frequency band between two circles with radiuses

(6)

R'1 and R'2, with R'1< R'2, into n equally-spaced homocentric circles and into m sectors to make the middle frequency band become l areas D = {d1, d2,, dl}, where l =m×n, as seen in Figure 2.5.

Then, the P' and D are compared to decide the bits of a watermark bit stream W = w1w2wl by the following way:



 ∈

= 0 ,

, ' 1

otherwise d p certain

wk if i k (4.1)

where 0<kl and 0<ih. This means that, if there is a peak within an area dk, the bit wk is set to be “1”; otherwise, “0”. Finally, transform the bit stream into an integer number as the extracted watermark. This completes the extraction process of the watermark.

R’1 R’2

d1

d2 d3 d4 d5

d6

Figure 4 The middle frequency band is separated into concentric circles and into angular sectors.

4.2 Detailed Algorithm

The input to the proposed watermark extraction process includes just a stego-image S. The output is a watermark W that is a serial number embedded presumably in S. The extraction algorithm can be expressed as an algorithm as follows.

Algorithm 2: Watermark extraction process.

Input: A stego-image S.

Output: A watermark W.

Steps.

1. Transform the red and blue color channels of S into the DFT domain to get Fourier spectra S’red and S’blue.

2. Detect peaks within the upper-half areas of S’red and S’blue, respectively, by performing the following operations.

2.1 Use a threshold value T to detect peaks in the middle-frequency band.

If a coefficient value is larger than T, it is considered as a peak.

2.2 Select a peak with the longest radius to be the synchronization peak, and calculate its changed angle ∆ with respective to the θ original angle of the synchronization peak.

2.3 Reconstruct the angles of the remaining h peaks by Eq. (2.8) to get their new locations P’ = {p'1, p'2,, p'h}.

2.4 Divide the middle frequency band between R'1 and R'2 into n equally- spaced concentric circles and into m sectors to make the middle band become several areas D = {d1, d2, , dl}, where l=m×n.

2.5 Compare P’ and D to decide the watermark bit stream according to the way specified by Eq. (4.1).

3. Link two watermark bit streams from S’red and S’blue sequentially.

4. Transform the linked watermark bit stream into a serial number.

5. Take the final result as the desired watermark W.

5. Experimental Results

Some experimental results of applying the proposed method are shown here. A serial number 877 is transformed into binary form to be a watermark bit stream. The factor c that determines the embedded watermark strength is assigned to be 1.5. Figure 5 shows an input image with size 512×512. And Figure 6(a) shows the stego-image of Figure 5 after embedding the watermark. In addition, Figures 6(b) and (c) show the corresponding Fourier spectrum image and the detected locations of the peaks marked with

(7)

red and green marks. The green mark is the synchronization peak. Figure 6(d) show a rotated image of Figure 6(a) and the corresponding Fourier spectrum image and the detected peak locations are shown in Figures 6(e) and (f), respectively. It shows that the Fourier spectrum image have the same angle of rotation with the tampered image. Figure 7(a) shows a scaled image of Figure 6(a) and the corresponding Fourier spectrum image with the detected peak locations are shown in Figure 7(b). The embedded peaks can be successfully detected in our experiments.

Figure 5 An input image “Lena”.

(a) (d)

(b) (e)

(c) (f)

Figure 6 An output stego-images with the watermark, the tampered image and Fourier spectrum images. (a) Stego-Image “Lena”. (b) Fourier spectrum image of (a). (c) Peak locations of (c). (d) Tampered image after rotating 13 degree clockwise. (e) Fourier spectrum image of (d). (f) Peak locations of (e).

Figures 8(a) and (b) show two other color images both with size 512×512. And the corresponding stego-images after embedding the watermark are shown in Figures 8(c) and (d), respectively. The corresponding PSNR values are shown in Table 2, which show that the quality of each of the stego- images is still good. And the embedded watermark is imperceptible by human vision.

(a) (b)

Figure 7 The tampered image and the Fourier spectrum image.

(a) Tampered image after scaling to 90%. (b) Fourier spectrum image of (a) with peak locations.

(a) (c)

(8)

(b) (d)

Figure 8 Input images, and output stego-images with the watermark. (a) Image “Pepper”. (b) Image

“Jet”. (c) and (d) Stego-images after embedding the watermark, respectively.

Table 2. The PSNR values of recovered images after embedding watermarks.

Lena Pepper Jet

PSNR 33.0 33.0 33.0

6. Discussions and Summary

In this chapter, we have proposed a method for embedding a watermark into a color image by coding and synchronization of coefficient-value peak locations in the DFT domain. According to the properties of image coefficients in the DFT domain, we embed the watermark by creating the peaks circularly and symmetrically in the middle frequencies. On the other hand, an extra synchronization peak is added to synchronize the peak locations. The embedded watermark is shown to be robust and can survive the rotation and scaling attacks by the experimental results.

The proposed method can achieve the goal to protect image copyright of the owner.

However, in the proposed watermark embedding method, the capacity of hiding data is not large. It is not enough to embed a logo image. In future works, it may be tried to solve this problem.

7. REFERENCES

[1] J. J. K. O'Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” Proceedings of IEEE International Conference on Image

Processing, Santa Barbara, CA USA, Vol. 1, pp. 536-539, Oct. 26-29, 1997.

[2] M. Wu and M. L. Miller, J. A. Bloom, and I. J.

Cox, “A rotation, scale and translation resilient public watermark,” Proceedings of 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, Phoenix, AZ USA, Vol. 4, pp. 2065, March 15-19, 1999.

[3] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M.

L. Miller, and Y.M. Lui, “Rotation, scale, and translation resilient watermarking for images,”

IEEE Transactions on Image Processing, Vol.

10, Issue 5, pp. 767-782, May 2001.

[4] P. C. Su and C. C. Kuo, “An Image

Watermarking Scheme to Resist Generalized Geometrical Transformations,” Proceedings of SPIE Conference on Multimedia Systems and Applications III, Boston, Massachusetts, Vol. 4209, pp. 354-365, November 5-8, 2000.

[5] R.C. Gonzalez and R. E. Woods, “Digital Image Processing,” second edition, pp. 155, 2002.

[6] http://www.ph.tn.tudelft.nl/Courses/FIP/nofra mes/fip-Properti-2.html, Properties of Fourier Transforms.

[7] C. Y. Lin and S. F. Chang, “Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process,” Proceeding of International Symposium on Multimedia Information Processing (ISMIP), Taipei, Taiwan, Dec. 1999.

[8] A. Navarro and J. Tavares, “Joint Source- Channel PCM Image Coding for Binary Symmetric Channels”, Proceeding of International Conference on Signal Processing Applications and Technology, Orlando-USA, 1999.

[9] J. O'Ruanaidh, W. J. Dowling, and F. M.

Boland, “Phase watermarking of digital images,” Proceeding of ICIP’96, Lausanne, Switzerland, vol. 3, pp. 239–242, Sept. 1996.

(9)

參考文獻

相關文件

A revolution: Probability propagation in networks with cycles, Jordan, Kearns and Solla (eds), Advances in Neural Information Processing Systems 10, MIT Press.

• Color the nodes representing literals by their truth values (color 0 for false and color 1 for true).. – We are dealing with the a-triangles here, not the

In this way, we can take these bits and by using the IFFT, we can create an output signal which is actually a time-domain OFDM signal.. The IFFT is a mathematical concept and does

The accuracy of a linear relationship is also explored, and the results in this article examine the effect of test characteristics (e.g., item locations and discrimination) and

In this paper, we extended the entropy-like proximal algo- rithm proposed by Eggermont [12] for convex programming subject to nonnegative constraints and proposed a class of

In this paper, we build a new class of neural networks based on the smoothing method for NCP introduced by Haddou and Maheux [18] using some family F of smoothing functions.

Chen, The semismooth-related properties of a merit function and a descent method for the nonlinear complementarity problem, Journal of Global Optimization, vol.. Soares, A new

In this paper, we have shown that how to construct complementarity functions for the circular cone complementarity problem, and have proposed four classes of merit func- tions for