HVS Model-based Watermarking Robust to Lossy Compression, Cropping, and Scaling

유손실 압축, 잘라내기 및 신축에 대해 견고한 HVS 모델 기반 워터마킹

  • Hong, Su-Gi (Dept.of Electronics Engineering, Graduate School of Kyungpook National University) ;
  • Jo, Sang-Hyeon (Dept.of Electronics Engineering, Graduate School of Kyungpook National University) ;
  • Choe, Heung-Mun (Dept.of Electronics Engineering, Graduate School of Kyungpook National University)
  • 홍수기 (경북대학교 전자·전기공학부) ;
  • 조상현 (경북대학교 전자·전기공학부) ;
  • 최흥문 (경북대학교 전자·전기공학부)
  • Published : 2001.09.01

Abstract

In this paper, we proposed a HVS(human visual system) model-based digital image watermarking which is not only invariant to rotation and translation but also more robust to lossy compression, cropping, and scaling as compared to the conventional method. Fourier transform and log-polar mapping is used to make the proposed algorithm invariant to rotation and translation, and in addition, watermark energy is embedded maximally based on spatial frequency sensitivity of HVS without the deterioration of the invisibility. As a result, the robustness of watermarking is improved both in general image processing operations such as cropping, low pass filtering, and lossy compression and in geometrical transforms such as rotation, translation, and scaling. And, by disjoint embedding of the watermark and the template without intersection, the deterioration of invisibility and robustness is prevented. Experimental results show that proposed watermarking is about 30~75 [%] more robust af compared to the conventional methods.

본 논문에서는 인간시각시스템 모델에 기반하여 회전과 이동은 물론 유손실 압축과 잘라내기 및 신축에 대해서도 견고한 디지털 영상 워터마킹을 제안하였다. 기존의 퓨리에 변환과 로그폴라맵핑을 이용하여 회전및 이동에 불변하도록함과 동시에 인간시각스템 모델의 공간주파수 감도를 감안하여 비가시성이 떨어지지 않는 범위 내에서 워터마크 에너지를 최대한 인가하고, 각 워터마크 비트들의 정보를 임의 섞음하여 전 영역에 분산 삽입하였다. 이와 같이 함으로써 잘라내기와 유손실 압축과 같은 영상처리나 회전, 이동 및 신축과 같은 기하학적 변형 등에 대해 워터마크 견고성을 더욱 향상시켰다. 또한 워터마크와 템플릿을 교차하지 않게 삽입함으로써 이들의 교차로 인한 비가시성과 견고성의 저하를 방지하였다. 실험을 통하여 제안한 워터마킹 방법은 유손실 압축, 잘라내기 및 신축에 대하여 기존방법보다 약 30∼75 [%]정도 더 견고성이 향상됨을 확인하였다.

Keywords

References

  1. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, 'A digital watermark,' IEEE International Conference on Image Processing, vol. II, pp. 86-90, Texas, 1994
  2. G. Caronni, 'Assuring ownership rights for digital images,' Processing Reliable IT Systems, VIS'95, Vieweg Publishing Company, 1995
  3. K. Tanaka, Y. Nakamura, and K. Matsui, 'Embedding secret information into a dithered multi-level image,' Processing 1990 IEEE Military Communications Conference, pp. 216-220, 1990 https://doi.org/10.1109/MILCOM.1990.117416
  4. K. Matsui and K. Tanaka, 'Video-steganography,' IMA Intellectual Property Project Proceedings, vol. I, pp. 187-206, 1994
  5. J. Cox, J. Kilian, T. Leighton, and T. Shammon, 'Secure spread spectrum watermarking for multimedia,' NFC Research Institute Technical Report, 95-10, 1995
  6. I. J. Cox, J. Kilian, T. Leighton, and T. Shammoon, 'Secure spread spectrum watermarking for images, audio and video,' International Conference on Image Processing, vol. III, pp. 243-246, Lausanne, 1996 https://doi.org/10.1109/ICIP.1996.560429
  7. Z. H. Wei, P. Qin, and Y. Q. Fu, 'Perceptual digital watermark of images using wavelet transform,' IEEE Transactions on Consumer Electronics, vol. IV. pp. 1267-1272, Nov. 1998 https://doi.org/10.1109/30.735826
  8. Chiou-Ting Hsu and Ja-Ling Wu, 'Hidden digital watermarks in images,' IEEE Transaction on Image Processing, vol. VIII, no. 1, Jan. 1999 https://doi.org/10.1109/83.736686
  9. Christine I. Podilchuk and Wenjung Zeng, 'Image-adaptive watermarking using visual models,' IEEE Journal on Communications, vol. 16, no. 4, May 1998 https://doi.org/10.1109/49.668975
  10. A. Piva, M. Barni, F. Bartolini, and V. Cappellini, 'DCT-based watermark recovering without resorting to the uncorrupted original images,' International Conference on Image Processing, vol. I, pp. 520-523, Oct. 1997 https://doi.org/10.1109/ICIP.1997.647964
  11. S. Pereira, J. Ruanaidh, F. Deguillaume, G. Csurka and T. Pun, 'Template based recovery of Fourier-based watermarks using log-polar and log-log maps,' IEEE International Conference on Multimedia Computing and Systems, vol. I, pp. 870-874, 1999 https://doi.org/10.1109/MMCS.1999.779316
  12. J. O'Ruanaidh and T. Pun, 'Rotation, scale and translation invariant digital image watermarking,' International Conference on Image Processing, vol. I, pp. 536-539, 1997 https://doi.org/10.1109/ICIP.1997.647968
  13. V. Solachidis and I. Pitas, 'Circularly symmetric watermark embedding in 2-D DFT domain,' IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. VI, pp. 3469-3472, Arizona, Mar. 1999 https://doi.org/10.1109/ICASSP.1999.757589
  14. James L. Mannos and David J. Sakrison 'The effects of a visual fidelity criterion on the encoding of image,' IEEE Transactions of Information Theory, vol. IT-20, no. 4, Jul. 1974