IJMER2
IJMER2
Gamal Fahmy
Electrical Engineering Dept., Assiut University, Egypt,
Abstract: Image watermarking, authentication and encryption have gained an increased importance during the last decade.
This is due to the widespread use of visual media over the Internet and in several digital media applications. Several
watermarking techniques have been proposed, some in spatial domain, and more recently in the transform/frequency domain
and have been reported to be robust against different attacks, namely compression. It is also well known the importance and
effectiveness of compression techniques to store transmit and retrieve visual information. However, the creation or
development of a joint watermarking and compression framework for images has yet to be explored, where watermarking
and compression could be pursued jointly on a trade-off manner. In other words, watermarking embedding/extraction can be
performed on compressed domain data, while compression parameters could be used as watermarking keys. The primary
focus of this paper is to explore this novel/unique idea. We propose a joint watermarking and compression (JWC) technique
in the transform domain. This transform domain is based on the Natural Preserve Transform and can be utilized to achieve a
balance between watermarking and compression for visual information. Watermarking performance is evaluated blindly for
different compressed domain data scenarios, while compression performance is analyzed for other watermarking cases.
Extensive simulation results that demonstrate the efficiency of the proposed joint watermarking and compression technique
are presented.
Keywords: Image Watermarking, Natural Preserve Transform, Image Compression; Hartley Transform
I. Introduction
The rapid growth of visual media based applications necessitates sophisticated compression techniques in order to store,
transmit and retrieve audio-visual information. The recent MPEG 4 and JPEG 2000 standards address the need for content
based coding and manipulation of visual media. With the widespread use of the Internet and the rapid and massive
development of multimedia, there is an impending need for efficient and powerfully effective copyright protection
techniques [1-3]. Digital watermarking schemes are typically classified into three categories. (1) Private watermarking which
requires the prior knowledge of the original information and secret keys, at the receiver, (2) Semi-private or semi-blind
watermarking where the watermark information and secret keys may be available at the receiver, and (3) public or blind
watermarking where the receiver must only know the secret keys [4]. The robustness of private watermarking schemes is
high to endure signal processing attacks. While private watermarking is suitable for high security applications such as
financial or defense data, it is are not feasible in real applications, such as DVD copy protection where the original
information may not be available for watermark detection. On the other hand, semi-blind and blind watermarking schemes
are more feasible in that situation [5], but they have lower robustness than the private watermarking schemes [6]. Hence,
while private watermarking is mainly utilized for authentication and verification, blind or public watermarking is for copy
protection applications. In general, the requirements of a watermarking system fall into three categories: robustness,
visibility, and capacity [7]
A variety of image watermarking methods have been proposed mostly based on transform domain [7-9]. In spite of
the successful performance of most watermarking techniques reported in the literature, they still suffer from being semi-
fragile due to the energy concentration of their transform domains (DCT and Wavelets), which makes them discard much of
the mid and high frequency watermarked data in compression [10-13].
Watermarking compressed domain data will obviate the need for it to be decompressed for watermark extraction, while
compressing watermarks would store and transmit visual data efficiently. Hence, there is an impending need for
sophisticated joint watermarking and compression techniques that could compress, protect and watermark data
simultaneously. While compression aims at concentrating data in the least possible information, watermarking aims at
distributing and hiding logos and parameters. Hence, compression and watermarking are inversely related and they have to
be treated on a trade-off manner. The amount of extracted/retrieved watermarked data is affected by the compression degree
of the host data, while the efficiency of compression is affected by the amount of data that needs to be embedded and
extracted.
In this paper we propose a transform domain based technique for data watermarking that has been previously
reported in [14], and [15]. This transform domain is based upon the Natural Preserve Transform (NPT) originally reported in
[16]. We utilized this transform domain to present our main contribution in this paper, which is to develop a joint
compression and watermarking system based on the NPT and wavelet domains for visual data. We try to achieve a
framework/equation that includes both compression and watermarking jointly in our proposed system. The organization of
this paper is as follows. Section 2 contains necessary mathematical background about the NPT based watermarking
approach. Section 3 briefly explains the watermarking embedding and extraction process in the NPT domain. Section 4
shows the robustness of the watermarking technique against several attacks. Section 5 shows our proposed joint
1 ( ) I H H H ... (5)
Fig. 1(b-c) shows the Lena image and its NPT transformed image. is adjusted to a value of 0.994, which yields a nominal
PSNR of around 45 dB. The high similarity between the original and transformed images, suggests that NPT is very
convenient for watermarking and data hiding.
(d) (e)
Fig. 1. (a) Transform basis of the Hartely. (b-c) Original image and its NPT image, computed
with 0.994 . (d) NPT watermarked image with logo in last r rows. (e) NPT watermarked image
with last r rows replace with last r rows of original image
3.1 Watermark Embedding
Let the host image S, (size N x N) be watermarked by a watermarking logo (image) w, of size (m x n). In the bottom
embedding technique [14-15], the logo is embedded to S as the last r bottom lines. Hence, the logo matrix is reshaped to be a
matrix w1 (of size r x N, r mn ). Then, the last r rows of S are replaced by the reshaped logo w1, as in Fig. 1(d). This would
N
S
S wm 1 , S1 S (1 : N r ,:) . Then the NPT of Swm is obtained as:
yield a watermarked image Swm,
w1
A0 w ( N r )
Aw ( ) S wm ( )
z r (6)
N
This step in eq. 6, would register the watermark (distribute its energy) over the entire host image. In order to make the
watermarking logo invisible, we replace the last r rows z of A w with the last r of the original image S, Fig 1(e).
A0w
Awm (7)
S ( N r 1 : N , :)
then its maximum rank is r. Consequently, the rank of the matrix V is (N-2r), [19].
V t A 0w V t 11 S1
t
3. Pre-multiply Equation (13) by V to yield (15)
As the rank of 11 is (N-r), the rank of V 11 is (N-2r). So, to have a unique solution of eq.15, r arbitrary parameters of
t
every column of S1 have to be known at the receiver/extractor. This can be achieved if in the watermarked image Aw, we
choose the matrix z (eq. 6), to be S(N-2r+1:N-r,:) instead of S(N-r+1:N,:).(it basically means replicating the r last rows of
the image as in Fig. 2 (a)).
Watermarked Image A w m
LLLL
HL
Last r rows
replicated LH HH
(a) (b)
Fig.2. (a) Example of host images with last r rows replicated, N=256, r=8
(b) LLLL is the lowest band in a 2 layer wavelet decomposition
Having obtained S1 as the unique solution of eq.15, w1 (the logo) is extracted as in the non-blind case, and subsequently
reshaped to regain the original watermark w. We used the terminology quasi blind, as a minor amount of information has to
be known (r parameters of every column) at the receiver side. We note here that having r rows of the host image known at
the receiver side as a mandatory condition for our blind technique is a slight draw back. However if we replicate the r rows
of our host image, S(N-2r+1:N-r,:), as the last r rows, our host image would be like fig.4(a) with negligible effect for this
replication process, especially if the host image has a large size compared to r, as N>>>r.
Fig. 3 PSNR and NCORR values for differential alpha values for different
From all above, we can identify the two variables of alpha and C as the parameters that affect the performance of our
proposed joint watermarking and compression system. As shown above, each of them can significantly affect the
performance of both watermarking and compression (JWC) on an inverse manner. Hence these two parameters can be
combined into a single equation with a Lagrange multiplier as in eq. 16. The Lagrange multiplier can be adjusted to control
both alpha ( ) and C on a trade-off manner. JWC stand for performance of our joint system.
JWC *C (16)
Fig.4 shows a block diagram of the proposed joint watermarking and compression system with a Lagrange multiplier as an
adjustor that controls the trade-off between both. Fig. 5 shows the PSNR and the NCORR values for different alpha values
on the same curve, it can be shown that an alpha value of 0.985 is optimal on that curve’s trade-off.
Fig.6 shows the reconstructed PSNR quality of host images from watermarking the LL band for different number of layers,
with an alpha ( ) value of 0.985 and 2.5 target bpp. Fig. 7 shows the reconstructed PSNR quality of host images for
different bit rates from one wavelet decomposition layer with an alpha value of 0.985.
Input Data
Wavelet No. of C
Decomposition layers NPT based
Watermarking
bpp
Extraction Output Data
5. Discussion
In this paper we presented a joint watermarking and compression system that can both compress and watermark a host image
on a trade-off manner. We note here that our primary objective was to present the idea of joint compression and
watermarking, rather than a regular single watermarking or compression technique like the recent literature, or our work in
[14-15].
Fig. 5 Joint graph for PSNR and NCORR values for different alpha values
Fig. 6 PSNR reconstructed quality of host for different number of wavelet layers
Fig. 7 PSNR reconstructed quality for different bpp for one wavelet decomposition layer
Fig. 8 PSNR reconstructed quality for host for different logo sizes
Fig. 9 Joint watermarking and Compression for different alpha values for Lena and
Cameraman images
7. Conclusions
Our proposed system can be utilized in joint watermarking and compression applications that exploits compression
parameters as watermarking variables, while compression indices could be used as watermarking actuators/adjustors. Our
illustrated simulation results support our hypotheses and analogies in joint watermarking and compression, that they are
inversely related and there is a trade-off relation between them, hence they should be treated jointly to achieve the optimal
point of them. This work is funded by the ministry of Communication and Information Technology, Egypt, ITIDA. It has
also been funded partly by the Alexander von Humboldt foundation, Germany.
References
1. C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious
manipulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153–168, Feb. 2001.
2. N. Nikolaidis and I. Pitas, Robust image watermarking in the spatial domain, Signal Processing, Elsevier, vol. 66, no.
3, pp. 385-403, 1998.
3. P. V. K. Borges and J. Mayer, “Text luminance modulation for hardcopy watermarking” Signal Processing, Elsevier,
Vol. 87, Issue 7, July 2007.
4. Y. Hsien-Chu Wu and Chin-Chen Chang," A novel digital image watermarking scheme based on the vector
quantization technique", Computers & Security, Elsevier, Vol. 24, pp.460-471, 2005.
5. Y. Wang, A. Pearmain, Blind image data hiding based on self reference, Pattern Recognition Letters 25 (2004) 1681–
1689.
6. P. H.W. Wong, Oscar C. Au, Y.M. Yeung, A novel blind multiple watermarking technique for images, IEEE
Transactions on Circuits and Systems for Video Technology 13 (8) (2003) 813– 830.
7. J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, DCT-domain watermarking techniques for still image: Detector
performance analysis and a new structure, IEEE Trans. Image Processing, (9) (2000) 55–68.
8. H. Munawer Al-Otum, N. Abdul Samara A robust blind color image watermarking based on wavelet tree bit host
difference selection, pp. 2498-2512 Signal Processing (Elsevier) Volume 90, Issue 8, Aug. 2010).
9. I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE
Transactions on Image Processing 6 (12) (1997) 1673–1687.
10. J. Fridrich, “A hybrid watermark for tamper detection in digital images,” in Proc. Int. Symp. Signal Processing and
Applications, Aug. 1999, pp. 301–304.
11. C. Deng, X.-B. Gao, and et al. A Local Tchebichef Moments-Based Robust Image Watermarking. Signal Processing
(Elsevier), Vol.89, No.8, pp.1531-1539, August, 2009.
12. E. First, X. Qi, A Composite Approach for Blind Grayscale Logo Watermarking, ICIP, 2007, 265-268.
13. T. Duy Hien, I. Kei, H. Harak, Yen-Wei Chen, Y. Nagata, Z. Nakao, “Curvelet-Domain Image Watermarking Based
on Edge-Embedding”, proc. of the 11th International Conference on Knowledge-Based Intelligent Information and
Engineering Systems (KES 2007). (2007) 311-317.
14. M. F. Fahmy, O. M. Fahmy and G. Fahmy, " A Quasi Blind Watermark Extraction of Watermarked Natural Preserve
Transform Images ", IEEE International Conference on Image Processing, ICIP November 2009.
15. G. Fahmy, M. F. Fahmy and U. S. Mohamed, “Non Blind and Quasi-Blind Natural Preserve Transform Watermarking
and Data Hiding Technique”, EURASIP Journal of advances on Signal Processing, volume 2010, ID. 452548.
16. R. Yarlagda, J. Hersshey, Natural Preserving Transform for Image Coding and Reconstruction, IEEE Trans. Acoustic,
Speech and Signal Processing, 4 (33) (1985)1005-1012
17. M. Ahmed, Digital Image Watermarking using Fuzzy Logic and Naturalness Preserving Transform, A Ph.D. Thesis,
Kansas State University (2004).
18. D. D. Day and A.M. Ahmed, A Modified Natural Preserving Transform for data hiding and Image Watermarking,
Proc. JCIS 7th Joint Conf. of IASTED Int. Conf. on Signal and Image Processing, 2003, 44-48.
19. J. W. Daniels," Applied Linear Algebra " Prentice Hall International Inc., Engle wood Cliff, New Jersey, U.S.A.,
1988.
20. A. Said and W. Pearlman, A new, fast and efficient image codec based on set partitioning in hierarchical trees," in
IEEE Trans. Circuits and Systems for Video Technology. 6(3) (1996) 243-250.
21. D. Taubman, “High Performance Scalable Image Compression with EBCOT”, IEEE Transactions on Image
Processing, vol. 9, No. 7, July 2000