Adaptive Blind Watermarking Technique by Biased-Shift of Quantizer

양자화기의 편의이동에 의한 적응적인 블라인드 워터마킹 기술

  • Seo Young-Ho (Dept. of Electronic Engineering Information Yuhan College) ;
  • Choi Hyun-Joon (Dept. of Electronic Materials Eng. Kwangwoon University) ;
  • Choi Soon-Young (Dept. of Electronic Materials Eng. Kwangwoon University) ;
  • Lee Chang-Yeul (Dept. of Electronic Materials Eng. Kwangwoon University) ;
  • Kim Dong-Wook (Dept. of Electronic Materials Eng. Kwangwoon University)
  • 서영호 (유한대 전자정보과) ;
  • 최현준 (광운대학교 전자재료공학과) ;
  • 최순영 (광운대학교 전자재료공학과) ;
  • 이창열 (광운대학교 전자재료공학과) ;
  • 김동욱 (광운대학교 전자재료공학과)
  • Published : 2005.03.01

Abstract

In this paper, we proposed a blind watermarking algerian to use characteristics of a scalar quantizer which is the recommended in the JPEG2000 and JPEG. The proposed algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and is adaptively applied as a assigned quantizer according application areas. Before embedding process, a LFSR(Linear feedback shift register) rearranged the watermark for the security of the watermark itself and in the embedding process, a LFSR is used to hide the watermarking positions. Therefore the embedded watermark can he extracted by only the owner who knows the initial value of LFSR without the original image. The visual recognizable pattern such as a binary image was used as the watermark. The experimental results showed that the proposed algerian satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking. The results showed the largest error rate to be $5.7\%$ for attack. The experimental result which compares the proposed algorithm with the Mohamed algorithm showed that the proposed algorithm was better than it, exactly $4\~5$ times for the attacks of JPEG and JPEG2000.

본 논문에서는 영상압축 표준 방식인 PEG과 JPEG2000등에서 사용하는 양자화 방식인 스칼라(Scalar) 양자화기의 특성을 이용한 블라인드 워터마킹 알고리즘을 제안하였다. 제안된 알고리즘은 손실 압축 기술인 양자화로 인한 워터마크의 손실을 막기 위해 워터마크에 따라 양자화 인덱스를 선택하는 방법을 사용하였다. 따라서 워터마크 삽입을 위한 별도의 과정 없이 양자화 과정 중에 워터마크가 삽입되고 적용 분야에 따른 양자화기의 특성을 이용하므로 영상에 적응적이다. 알고리즘의 안정성을 높이기 위하여 LFSR(Linear feedback shift register)을 사용하여 워터마크를 재배열하였으며, 워터마크의 삽입 과정에서도 LFSR을 사용하여 삽입위치를 은닉하였다. 따라서 추출 시에 양자화 인덱스와 양자화기의 정보에 의해 원 영상 없이 워터마크의 추출이 가능하며, LFSR의 초기치를 아는 소유자만이 추출 및 판독이 가능하다. 삽입되는 워터마크는 시각적으로 인지할 수 있는 특정 로고 형태의 2진 영상을 사용하였다. 본 논문에서 제안한 기법은 JPEG과 PEG2000에 적용하여 워터마킹의 요구조건인 강인성(Robustness)과 비인지성(Imperceptibility)을 실험하였으며, 각 공격에 대하여 최대 $5.7\%$정도의 오차율(Error ratio)을 얻었다. 또한 기존의 방법과 비교한 실험에서도 PEG과 JPEG2000의 각 공격에 대해 약 4-5배정도의 우수한 오차 특성을 보여주고 있다.

Keywords

References

  1. K. Tanaka, Y.Nakamura, and K. Matsui, 'Embedding Secret Information Into a Dithererd Multilevel Image,' in Proceedings of the 1990 IEEE Military Communications Conference, pp. 216-220, 1990 https://doi.org/10.1109/MILCOM.1990.117416
  2. G. Caronni, 'Ermitteln unauthorisierter Verteiler von maschinenlesbaren Daten,' Technical report, ETH Zurich, 1993
  3. A. Tirkel, et al., 'Electronic Water Mark,' in Proceedings DICTA, pp. 666-672, 1993
  4. I. Pitas, 'A Method for Signature Casting on Digital Image,' IEEE Int. Conf. on Image Processing, vol. 3, pp. 219-222, 1996 https://doi.org/10.1109/ICIP.1996.560422
  5. M. Kutter, F. Jordan, and F. Bosson, 'Digital Signature of Color Images using Amplitude Modulation', Proc. of SPIE, vol. 3022, pp. 518-526, 1997 https://doi.org/10.1117/12.263442
  6. J. O. Ruanaidh, W. J. Dowling, and F. M. Boland, 'Phase Watermarking of Digital Images', in Proc. ICIP'97, vol. 1, pp. 239-242, Sept. 1996. https://doi.org/10.1109/ICIP.1996.560428
  7. I. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Transactions on Image Processing, Vol. 6, pp. 1673-1687, Dec. 1997 https://doi.org/10.1109/83.650120
  8. I. J. Cox and M. L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling', Proc. of SPIE Conf. on Human Vision and Electronic Imaging II, vol. 3016, pp. 92-99, February, 1997
  9. M. Barni, 'Image Watermarking of Secure Transmission over Public Networks', Proc. of COST 254 Workshop on Emerging Techniques for Communication Terminals, Toulouse, France, pp. 290-294, July, 1997
  10. X. G. Xia and C. G. Boncelet and G. R. Arce, 'A Multiresolution Watermark for Digital Images,' Proc. of IEEE ICIP, Vol.3, pp.548-551, 1997 https://doi.org/10.1109/ICIP.1997.647971
  11. Ming-Shing Hsieh and Din-Chang Tseng, 'Hiding Digital Watermarks Using Multiresolution Wavelet Transform,' IEEE Trans. on Industrial Electronics, Vol.48, No.5, October, 2001 https://doi.org/10.1109/41.954550
  12. Mohamed S. Yasein and Agathoklis, P, 'A wavelet-based blind and readable image watermarking algorithm,' Signals, Systems and Computers, 2002. Conference Record of the Thirty-Sixth Asilomar Conference on , vol. 2 , Nov., pp. 1215-1219, 2000 https://doi.org/10.1109/ACSSC.2002.1196975
  13. D. Kunder, D. Hatzinakos, 'Digital Watermarking for Telltale Tamper Proofing and Authentication,' IEEE Proceedings. Vol.87, pp.1167-1180, July, 1999 https://doi.org/10.1109/5.771070
  14. ISO/ISE 10918-1/ITU-T Recommendation T.81, 'Digital Compression and Coding of Continuou-stone Still Images', 1992
  15. ISO/IEC JTC1/WG1 N1890R, 'JPEG2000 Part I Final Draft International Standard', Sep. 25, 2000