DOI QR코드

DOI QR Code

An Iterative CRT Based Image Watermarking on DCT Domain

  • Received : 2019.01.08
  • Accepted : 2019.02.18
  • Published : 2019.02.28

Abstract

Digital image watermarking techniques have been studied in various fields in order to protect the copyright of multimedia contents mostly composed by images. JPEG compression is a representative copyright attack for image watermarking. The CRT-based watermarking methods in DCT domain have been studied, because these are robust for JPEG compression attack. In this paper, we propose a new method with improved performance compared with the existing CRT based methods in DCT domain. The proposed method selects the DCT block according to the denseness at the watermark insertion phase, and iteratively adjust the CRT Conditional coefficients at the watermark extraction. This paper shows that it is more robust for the JPEG compression attacks through experimental results.

Keywords

CPTSCQ_2019_v24n2_41_f0001.png 이미지

Fig. 1. Watermark Embedding Procedure Method-2

CPTSCQ_2019_v24n2_41_f0002.png 이미지

Fig. 2. 8x8 DCT Blocks

CPTSCQ_2019_v24n2_41_f0003.png 이미지

Fig. 3. Proposed Watermark Embedding Scheme

CPTSCQ_2019_v24n2_41_f0004.png 이미지

Fig. 4. 8x8 DCT Block Density

CPTSCQ_2019_v24n2_41_f0005.png 이미지

Fig. 5. Extract Procedure in the Proposed Scheme

CPTSCQ_2019_v24n2_41_f0006.png 이미지

Fig. 6. Watermark Embedding Procedure

CPTSCQ_2019_v24n2_41_f0007.png 이미지

Fig. 8. Proposed Watermarking Procedure at QF 70[%]

CPTSCQ_2019_v24n2_41_f0008.png 이미지

Fig. 7. Test Images. (a) Lena (b) Baboon (c) Airplane

Table 1. Comparison of Computation Time Complexity

CPTSCQ_2019_v24n2_41_t0001.png 이미지

Table 2. Comparison of PSNR and TAF when JPEG Compression Attack and No Attack

CPTSCQ_2019_v24n2_41_t0002.png 이미지

Table 3. TAF Identification and Performance Comparison for Step-By-Step JPEG Compression

CPTSCQ_2019_v24n2_41_t0003.png 이미지

References

  1. Gongsoo Jang, Hongjin Lee, Jooseung Yun and Yongsoo Park, "The Trend of Digital / Software Watermarking Technology for Digital Management," Proceedings of The KISS Conferences, Vol. 35, No. 1D, pp. 10-14, Jun, 2008.
  2. I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Academic Press, San Diego, 2002
  3. V. M. Potdar, S. Han and E. Chang, "A survey of digital image watermarking techniques", IEEE Intl. Conf. Industrial Informatics, Perth, Australia, Aug.2005, pp.709-716.
  4. C-T. Hsu and J-L. Wu, "Hidden digital watermarks in images", IEEE Trans. Image Processing, vol. 8, no. 1, pp.58-68, Jan. 1999 https://doi.org/10.1109/83.736686
  5. I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec 1997. https://doi.org/10.1109/83.650120
  6. Shinfeng D. Lin, Shih-Chieh Shie, Jian-Yi Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression", International Conference on Consumer Electronics, pp. 343-344, 8-12 Jan., 2005.
  7. P. Meerwald and A. Uhl, "Survey of wavelet-domain watermarking algorithms", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 505-516, 2001
  8. A. A. Mohammad, A. Alhaj and S. Shaltaf, "An improved SVD-based watermarking scheme for protecting rightful ownership", Signal Processing, vol. 88, pp. 2158-2180, 2008 https://doi.org/10.1016/j.sigpro.2008.02.015
  9. Ali, M., Ahn, C. W., Pant, M., Siarry, P, "An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony", Information Sciences, 301, 44-60, 2015. https://doi.org/10.1016/j.ins.2014.12.042
  10. Sung-Ho Bae, "Improved CRT-based Image Watermak ing in DCT Domain for Copyright Protection," Journal of Korea Multimedia Society, Vol. 16, No. 10, pp. 1163-1170, Oct, 2013. https://doi.org/10.9717/kmms.2013.16.10.1163
  11. J. C. Patra, A. Karthik and C. Bornand, "A Novel CRT-based watermarking technique for authentication of multimedia contents," Digital Signal Processing, vol. 20, no. 2, pp. 442-453, July 2009 https://doi.org/10.1016/j.dsp.2009.07.004
  12. J. C. Patra, J. E. Phua and C. Bornand, "A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression", Digital Signal Processing, vol. 20, no. 6, pp. 1597-1611, Mar. 2010 https://doi.org/10.1016/j.dsp.2010.03.010
  13. Patra, Jagdish C., A. K. Kishore, and Cedric Bornand. "Improved CRT-based DCT domain watermarking technique with robustness against JPEG compression for digital media authentication." In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pp. 2940-2945.
  14. J. C. Patra, J. E. Phua and D. Rajan, "DCT Domain watermarking scheme using Chinese Remainder Theorem for image authentication", in Proc. IEEE Intl. Conf. Multimedia and Expo (ICME 2010), Singapore, July 2010, pp. 111-116.
  15. U. Sudibyo, F. Eranisa, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, "A Secure Image Watermarking using Chinese Remainder Theorem Based on Haar Wavelet Transform," 2017 4th Int. Conf. Inf. Technol. Comput. Electr. Eng., pp. 208-212, 2017.
  16. Hwai-Tsu HU, Hsu L-Y, "Exploring dwt-svd-dct feature parameters for robust multiple watermarking against jpeg and jpeg2000 compression". Comput Electr Eng 41:52-63, 2015. https://doi.org/10.1016/j.compeleceng.2014.08.001
  17. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G, "Secure and robust fragile watermarking scheme for medical images", IEEE Access 6:10269-10278, 2018. https://doi.org/10.1109/ACCESS.2018.2799240
  18. M.-K. Kim, S. Lee, and G.-Y. Kim, "Fake Iris Image Detection based on Watermark," Journal of the Korea Society of Computer and Information vol. 23, no. 4, pp. 33-39, Apr. 2018. https://doi.org/10.9708/JKSCI.2018.23.04.033
  19. W. Stallings, Cryptography and Network Security, Fifth Edition, Pearson Education Inc., 2011.