DOI QR코드

DOI QR Code

A Blind Watermarking Scheme Using Singular Vector Based On DWT/RDWT/SVD

DWT/RDWT/SVD에 기반한 특이벡터를 사용한 블라인드 워터마킹 방안

  • Luong, Ngoc Thuy Dung (Kyung Hee University, Department of Electronics and Radio Engineering) ;
  • Sohn, Won (Kyung Hee University, Department of Electronics and Radio Engineering)
  • Received : 2016.01.18
  • Accepted : 2016.03.09
  • Published : 2016.03.30

Abstract

We proposed a blind watermarking scheme using singular vectors based on Discrete Wavelet Transform (DWT) and Redundant Discrete Wavelet Transform (RDWT) combined with Singular Value Decomposition (SVD) for copyright protection application. We replaced the 1st left and right singular vectors decomposed from cover image with the corresponding ones from watermark image to overcome the false-positive problem in current watermark systems using SVD. The proposed scheme realized the watermarking system without a false positive problem, and shows high fidelity and robustness.

우리는 컨텐츠 복제방지를 위하여 기존의 SVD와 DWT/RDWT를 결합한 워터마킹 시스템에 특이벡터를 추가로 사용하는 방안을 제안하였다. 우리는 SVD를 사용하는 워터마킹 시스템에 존재하는 오류긍정문제(false-positive problem)를 극복하기 위하여 기존의 SVD기반 알고리즘과 같이 특이값에 워트마크를 임베딩할 뿐만 아니라, 커버이미지의 첫 번째 좌/우 특이벡터를 워터마크 이미지의 첫번째 좌/우 특이벡터와 교체하였다. 제안 방안은 오류긍정문제 (false-positive problem)가 발생하지 않는 워터마킹 시스템을 구현할 수 있었으며, 기존의 오류긍정문제가 없는 시스템과 비교하여 우수한 충실성과 강인성을 보여 주었을 뿐만 아니라, 오류긍정문제가 발생하는 시스템에 비해서도 크게 성능차이가 나지 않음을 보여 주었다.

Keywords

Ⅰ. Introduction

Currently multimedia contents are distributed over the Internet more and more, and protecting their legal copyright ownership becomes critical gradually. There have been many studies about using digital watermarks to solve the copyright protection problem [1-4], and as a result contents owners can embed their logos or personal information into the multimedia contents to protect their copyrights.

SVD is widely used in digital watermarking schemes because its features are not affected much by common attacks such as compression, geometric operations, etc. Nasrin et al. applied SVD to each sub-band generated by the RDWT transform [5], and they achieved high fidelity and strong robustness for JPEG compression, common filtering, and geometric attacks. However, it is not robust to noise addition attack. Saeed et al. [6] proposed a scheme using three-level DWT, SVD, and Radon transform. Their scheme chose LH3 and HL3 sub-bands for embedding watermark, and its fidelity is very high, but its robustness is not strong for noise addition attack. In [7], Chih-Chin Lai used DWT and selected LH and HL sub-bands to apply SVD and embed watermark image directly into the singular values. To decrease the cost of computational complexity, Sushma et al. proposed a scheme of using lifting wavelet transform (LWT) and SVD [8]. The similarity among these studies is that the singular values are employed mainly in the embedding process. The singular values are rarely changed to a small change in image intensity and the values are not much different among images. Because of the last feature, a scheme using singular values may cause the false positive problem. It means that adversaries can extract their fake watermark image to show their copyright ownership. Guo and Prasetyo proposed a scheme to avoid the false-positive problem by embedding principal component of watermark image into the cover image [9]. The DWT LL sub-band is divided into blocks and the maximal singular values of each block are chosen to embed the principal component of watermark image. This scheme cannot get strong robustness at high fidelity (more than 40dB), and the process of finding the optimal scale factor is a time-consuming job. Gupta and Raval proposed a scheme having no false-positive problem [10], and the scheme replaces the singular values of HH sub-band of cover image by the singular values of watermark image. The false-positive problem is overcome by generating and embedding digital signature into LL4 and HH4 sub-bands of cover image, but it is not robust enough.

We proposed an image watermarking scheme using singular vectors based on DWT and RDWT combined with SVD. Specially, to solve the false positive problem generated by using SVD, the proposed scheme replaces the 1st left and right singular vectors decomposed from the cover image by the corresponding vectors decomposed from the watermark image.

The paper is organized as follows: in section 2, the background reviews including SVD, DWT and RDWT are illustrated, and the problem to solve through our study is presented. The proposed scheme is presented in section 3, and section 4 shows the simulation results and the comparison between the proposed system and existing systems.

 

Ⅱ. Background Reviews and False Positive Problem

1. Background reviews

DWT and RDWT decompose an image into frequency channels of constant bandwidth on a logarithmic scale, and each transform can be implemented as a multistage transformation. An image is decomposed into four sub-bands denoted as LL, LH, HL and HH at the 1st level, where LH, HL, and HH represent the finest scale wavelet coefficients and LL stands for the coarse-level coefficients. RDWT is similar to DWT but it does not use down-sampling, and the dimension of each sub-band by DWT becomes a quarter of the cover image while the dimension of each sub-band by RDWT is same as the cover image as shown in Fig. 1.

Fig. 1.Dimension presentation of cover and transformed images (a) original, (b) DWT transform, (c) RDWT transform 그림 1. 카버 및 변환 영상의 크기 표현 (a) 카버 영상, (b) DWT 변환 영상, (c) RDWT 변환 영상

SVD is an effective method to decompose an image into a set of linear independent components. Cover image is decomposed into a diagonal matrix, and two orthogonal matrices, U and V, Generally, the SVD technique can be applied to a whole image or a sub-image. The SVD of an image is defined as Eq. (1)

where U and V are orthogonal matrixes, and S = diag(λk) is a diagonal matrix of singular values λk, k = 1, ..,r, which are arranged in decreasing order. and are called left and right singular vectors of an image A. It is observed that SVD decomposes an image into layers of as shown in Fig. 2.

Fig. 2.Decomposed layers of an image by SVD 그림 2. SVD에 의하여 분해된 영상 계층

Singular values of S represent the image luminance, and increasing λk will increase the image luminance. Singular vectors represent the geometric properties of an image, and UVT contains the structural information of the image as shown in Fig. 3 [11, 12].

Fig. 3.Oiginal image and UVT (a) original image (b) structural information UVT 그림 3. 원영상과 UVT (a) 원영상 (b) 구조적 정보, UVT

Most of the structural information is contained in the first layer . Through the SSIM (Structural Similarity) index which measures the similarity between two images [12], it is observed that the first layer contains most of the structural information. The SSIM index between the original image (Lena image with 512×512 resolution) and the 1st layer is about 0.5, and it is much bigger than the SSIM index between the original image and any other layer (for examples, 2nd layer is about 0.01).

2. False Positive Problem

The U and V orthogonal matrices of an original watermark image are required for the watermark extraction algorithm to be combined with the diagonal matrix S decomposed from the received watermarked image. The false positive problem originates from this step because the singular values are so stable that any change to image intensity cannot affect much to the singular values themselves. Moreover, the singular values of different images are quite similar to each other, and attackers may use the diagonal matrix decomposed from the watermarked image to combine with their fake orthogonal matrices Uf and Vf to retrieve the watermark image. As a result, attackers can extract their fake watermark image successfully, and it can be a problem for the copyright protection application.

 

Ⅲ. The proposed scheme

1. Watermark embedding algorithm

The proposed scheme applies 2DWT to the cover image A and RDWT to the watermark image W, and then applies SVD to HL2 sub-band A1 and to HL1 sub-band W1 as

Secondly, it modifies the singular values of by embedding watermark W directly, and then applies SVD to them as

where α is a scale factor.

Thirdly, it replaces 1st left and right singular vectors of the cover image with the corresponding vectors decomposed from the watermark image as

where,

Finally, it obtains the modified DWT coefficients by (A1)' = UA1SD(VA1)T and it finds the watermarked image AW by applying (2DWT)-1 to the 2DWT of a cover image replaced with (A1)'.

2. Watermark extraction algorithm

The proposed scheme applies 2DWT to the received watermarked image , and then applies SVD to 2HL sub-band ()1 using (5). If we define D*HL as (6), the extracted watermark is obtained using (7).

To overcome the false-positive problem, it is necessary to calculate and compare the correlation values between , and between .

 

Ⅳ. Simulation and results

The proposed scheme uses ‘Lena’ gray scale image with a 512×512 resolution as a cover image, and a watermark image, ‘Cameraman’, with a 128×128 resolution is embedded into the cover image by adjusting the scale factor to 0.005 to have a PSNR of 45.46 dB as shown in Figure 4.

Fig. 4.(a) Cover image (b) Watermark image (c) Watermarked image (PSNR=45.46 dB) 그림 4. (a) 카버 영상 (b) 워트마크 영상 (c) 워트마크가 포함된 영상 (PSNR=45.46 dB)

The watermarked image was tested against several attacks: salt and pepper noise (noise density = 0.001), Gaussian noise (μ=0, σ2=0.005), speckle noise (noise density = 0.001), average filter (3×3), Gaussian filter (3×3), rotation (45°), JPEG compression (Q=50, 70), brightness, contrast and cut (10 pixels for left side). In Table 1, we compared our scheme with Lai’s, Nasrin’s and Guo’s schemes at the same fidelity (PSNR = 45.46 dB).

Table 1.Fidelity and robustness comparison of the proposed scheme with previous schemes 표 1. 제안 방안과 기존 방안간의 충실도 및 강인성의 비교

Lai’s scheme uses DWT/SVD and Nasrin’s scheme uses RDWT/SVD, and their scheme shows a little better robustness than the proposed system but they have a false-positive problem. The proposed system replaces the leftmost singular vectors of the unitary matrices of cover image with the ones of watermark image, but the replacement is limited only to the HL2 sub-band of cover image and its effects to fidelity and robustness are not critical. Therefore the proposed system can maintain high fidelity and strong robustness. Guo’s scheme has no false positive problem, but robustness is much worse than the other systems because it embeds principal component of watermark image into the cover image over the LL sub-band.

The false-positive problem can be solved by measuring correlation coefficient of the singular vectors of the original and extracted watermarks in our proposed scheme. In Figure 5, we define ρA as the correlation coefficient between , ρB as the correlation coefficient between , ρC as the correlation coefficient between , and ρD as the correlation coefficient between . When a fake watermark is used to verify ownership (or to calculate correlation coefficient), Wf is used as a subscription instead of W like . The true watermark is used to compute ρA and ρC, but a fake watermark is used to compute ρB and ρD.

Fig. 5.The correlation coefficient values of singular vectors of extracted watermark and original (or fake) watermark for several attacks 그림 5. 다수 공격에 대한 추출 워트마크와 원(또는 위조) 워트마크의 특이벡터간의 상관계수값

Figure 5 illustrates that ρA and ρC obtained by using a true watermark are much bigger than ρB and ρD obtained by using a fake watermark. If we choose max(ρA,ρC) as an additional measure to verify ownership, the false positive problem can be solved. The proposed scheme shows strong robustness to most of attacks, except the rotation attack because the singular vector has most of geometric information.

 

Ⅴ. Conclusion

This paper proposed a false-positive-free watermarking scheme based on DWT/RDWT/SVD for the copyright protection application. Cover and watermark images are transformed by 2DWT and RDWT separately, and SVD is applied to a sub-band of each image. The diagonal matrix from cover image is embedded with watermark image directly, and the components of the leftmost singular vectors of U and V of cover image are replaced with the ones of watermark image to overcome the false positive problems, which exist in watermark system using SVD. The proposed method gives higher robustness than previous false-positive-free system, and competitive robustness compared with SVD-based systems having a false positive problem.

References

  1. C. H. Huang, Ja-Ling. Wu, “Attacking Visible Watermarking Schemes,” IEEE Transactions on Multimedia, vol. 6, no. 1, February 2004.
  2. P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, F. Davoine, “Digital Watermarking Robust to Geometric Distortions”, IEEE Transactions on Image Processing, vol.14, no.12, December 2005.
  3. C. H. Huang, S. C. Chuang, J. L. Wu, “Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques”, IEEE Transactions on Multimedia, vol.10, no.4, June 2008. https://doi.org/10.1109/TMM.2008.921733
  4. M. Alghoniemy, H. Tewfik, “Geometric Invariance in Image Watermarking,” IEEE Transactions on image processing, vol.13, no.2, February 2004. https://doi.org/10.1109/TIP.2004.823831
  5. Nasrin M. Makbol, Bee Ee Khoo, “Robust Blind image watermarking scheme bases on Redundant Discrete Wavelet Transform and Singular Value Decomposition”, International Journal of Electronics and Communications (AEU), vol. 67, issue 2, February 2013, pp. 102-112. https://doi.org/10.1016/j.aeue.2012.06.008
  6. Saeed Rastegar, Fateme Namazi, Khashayar Yaghmaie, Amir Aliabadian, “ Hybrid Watermarking Algorithm Based on Singular Value Decomposition and Radon Transform”, International Journal of Electronics and Communications (AEU), vol. 65, issue 7, July 2011, pp. 658-663. https://doi.org/10.1016/j.aeue.2010.09.008
  7. Chih-Chin Lai, Cheng-Chih Tsai, “Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition”, IEEE Transactions on Instrumentation and Measurement, vol. 59, no.11, Nov. 2010. https://doi.org/10.1109/TIM.2010.2066770
  8. Sushma G. Kejgir, Manesh Kokare, “Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking”, International Journal of Computer Applications (0975-887), vol. 39, no. 18, Feb. 2012, pp. 10-18. https://doi.org/10.5120/5078-7193
  9. J.M. Guo, H. Prasetyo, “False-positive-free SVD-based image watermarking”, Journal of Visual Communication and Image Representation, vol. 25, Issue 5, July 2014, pp. 1149-1163. https://doi.org/10.1016/j.jvcir.2014.03.012
  10. A.K. Gupta, M.S. Raval, “A Robust and Secure Watermarking Scheme Based on Singular Values Replacement”, Sadhana, vol.37, part 4, August 2012, pp 425-440, Springer Verlag. https://doi.org/10.1007/s12046-012-0089-x
  11. R. Wang, Y. Z. Cui, Y. Yuan, “Image quality assessment using full-parameter singular value decomposition”, Optical Engineering, vol. 50, issue 5 (057005), May 2011.
  12. M. Narwaria, W. Lin, “Scalable Image Quality Assessment Based on Structural Vectors,” IEEE International Workshop on Multimedia Signal Processing (MMSP ’09), Oct. 5-7, 2009, Rio de Janeiro, Brazil.

Cited by

  1. Robust and Blind Watermarking for DIBR Using a Depth Variation Map vol.21, pp.6, 2016, https://doi.org/10.5909/JBE.2016.21.6.845