다해상도 웨이블릿 변환을 이용한 영상 융합 워터마킹 기법

Image Fusion Watermarks Using Multiresolution Wavelet Transform

  • Kim Dong-Hyun (Department of Electronic Engineering, Kyung Hee University) ;
  • Ahn Chi-Hyun (Department of Electronic Engineering, Kyung Hee University) ;
  • Jun Kye-Suk (Department of Electronic Engineering, Kyung Hee University) ;
  • Lee Dae-Young (Department of Electronic Engineering, Kyung Hee University)
  • 발행 : 2005.11.01

초록

본 논문은 MRA(Multi-Resolution Analysis) 웨이블릿 변환을 이용하여 영상 데이터의 저작권 보호를 위해 필요한 워터마크로 $64{\ast}64$ 이진 로고 영상의 1 레벨 DWT(Discrete Wavelet Transform) 계수값을 대상 영상의 LL 대역 및 특정 주파수 대역에 삽입하는 워터마킹 방법을 제안한다. 대상 영상을 3 레벨 DWT한 후 LL 대역과 특정 주파수 대역에 동일 주파수 방향으로 이진 로고 영상의 DWT 계수값을 블록별로 삽입한다. 대상 영상의 화질 저하를 막기 위해 각 블록내 SCs(Significant Coefficients)를 조사하여 해당 SCs 부분에 대해서만 워터마크를 삽입한다. 그리고 대상 영상의 왜곡시 각 주파수 대역별로 왜곡 정도가 틀리므로 SCs 이용시 사용되는 임계값을 주파수 대역별로 설정하여 각 주파수 대역별로 워터마크가 완전히 삽입되도록 한다. 그리고 워터마크가 인간의 시각 시스템으로부터 감추어져야 하므로 워터마크에 HVS(Human Visual System)을 적용하였다. 실험에서는 각 주파수 대역별로 비교하여 적절한 삽입 방법을 결정한다. 따라서 본 워터마킹 기법은 워터마크를 빠르고 정확하게 검출할 수 있으며, 작은 크기의 워터마크를 HVS와 SCs를 이용하여 삽입함으로써 비가시성과 강건성이 뛰어나다는 장점이 있다.

This paper presents a watermarking approach that the 1-level Discrete Wavelet Transform(DWT) coefficients of a $64{\ast}64$ binary logo image as watermarks are inserted in LL band and other specific frequency bands of the host image using Multi-Resolution Analysis(MRA) Wavelet transform for copyright protection of image data. The DWT coefficients of the binary logo image are inserted in blocks of LL band and specific bands of the host image that the 3-level DWT has been performed in the same orientation. We investigate Significant Coefficients(SCs) in each block of the frequency areas in order to prevent the quality deterioration of the host image and the watermark is inserted by SCs. When the host image is distorted by difference of the distortion degree in each frequency, we set the thresholds of SCs on each frequency and completely insert the watermark in each frequency of the host image. In order to be invisibility of the watermark, the Human Visual System(HVS) is applied to the watermark. We prove the proper embedding method by experiment. Thereby, we rapidly detect the watermark using this watermarking method and because the small size watermarks are inserted by HVS and SCs, the results confirm the superiority of the proposed method on invisibility and robustness.

키워드

참고문헌

  1. H. J. Wang and C. C. Jay Kuo, 'A multi-Threshold Wavelet Coder For High Fidelity Image Compression,' IEEE Image Processing, Vol.1, pp.652-655, 1997 https://doi.org/10.1109/ICIP.1997.647997
  2. A. S. Lewis and G. Knowles, 'Image compression using the 2-D wavelet transform,' IEEE Trans. Image Processing, Vol.1, pp.244-250, Apr., 1992 https://doi.org/10.1109/83.136601
  3. M. Antonini, M. Barlaud, P. Mathieu, and I. Daubechies, 'Image coding using the wavelet transform,' IEEE Trans. Image Processing, pp. 205-220, Apr. 1992 https://doi.org/10.1109/83.136597
  4. S. G. Mallet, 'A theory of multiresolution signal decomposition: the wavelet representation', IEEE Trans. on Pattern Recognition and Machine Intelligence, Vol. 11, No.7, pp. 674-693, July 1989 https://doi.org/10.1109/34.192463
  5. I. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Transactions on Image Processing, Vol. 6, pp. 1673-1687, Dec. 1997 https://doi.org/10.1109/83.650120
  6. She Kun, Huang Juncai, and Zhou Mingtian, 'Using key points to improve robust reference watermarking algorithm,' IEEE int. Conf. Information Reuse and Integration, pp.311-316 2003
  7. G. W. Braudaway, 'Protecting publicly-available images with an invisible image watermark,' in Proc. IEEE int. Conf. Image Processing, Vol.1, pp.524-527, Oct., 1997 https://doi.org/10.1109/ICIP.1997.647965
  8. G. Voyatis and I. Pitas, 'Digital image watermarking using mixing systems,' Comput. Graph, Vol. 22, No.4, pp. 405-416, 1998 https://doi.org/10.1016/S0097-8493(98)00030-2
  9. K. T. Knox, 'Reversible digital images,' Proc. SPIE, Security and Watermarking of Multimedia Contents, Vol. 3637, pp. 397-401, Jan. 1999
  10. Chun-Hsiang Huang, and Ja-Ling Wu, 'Attacking visible watermarking schemes,' IEEE Transactions on Multimedia, Vol. 6, pp.16-30 Feb. 2004 https://doi.org/10.1109/TMM.2003.819579
  11. Chiou-Ting Hsu and Ja-Ling Wu, 'Multiresolution Watermarking for Digital Images,' IEEE Transactions on circuits and systems-II : Analog and Digital Signal Processing, Vol. 45, No.8, pp. 1097-1101, Aug. 1998 https://doi.org/10.1109/82.718818
  12. X. G. Xia and C. G. Boncelet and G. R. Arce, 'A Multiresolution Watermark for Digital Images,' Proc. of IEEE ICIP, Vol.3, pp.548-551, 1997 https://doi.org/10.1109/ICIP.1997.647971
  13. Ying-Lan Chang, Koun-Tern Sun, and Yueh-Hong Chen 'ART2-Based Genetic Watermarking,' in Proc: IEEE into Conf. Advanced Information Networking and Application, Vol. 1, pp.729-734, 2005 https://doi.org/10.1109/AINA.2005.122
  14. Y. Wang, J. F. Doherty, and R. E. Van Dyck, 'A wavelet-based watermarking algorithm for ownership verification of digital images,' IEEE Transactions on Image Processing, Vol 11, pp.77-88, Feb. 2002 https://doi.org/10.1109/83.982816
  15. Ko-Ming Chan and Long-Wen Chang, 'A Novel Public Watermarking System based on Advanced Encryption System,' in Proc IEEE int. Conf. Advanced Information Networking and Application, Vol. 1, pp. 48-52, 2004 https://doi.org/10.1109/AINA.2004.1283886
  16. Paul Bao and Xiaohu Ma, 'Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,' IEEE Trans. on Circuits and Systems for Video Technology, Vol.15, No.1, pp.96-102, January, 2005 https://doi.org/10.1109/TCSVT.2004.836745(410)1