DCT-BASED DIGITAL IMAGE
WATERMARKING VIA IMAGE
SEGMENTATION TECHNIQUES Abstract: In recent years, digital watermarking techniques have been proposed to protect the copyright of multimedia data. Different watermarking schemes have been suggested for images. This paper proposes a watermarking algorithm based on image segmentation and discrete cosine transform (DCT). The image is first segmented using expectation maximization (EM) algorithm. For each segment, the image segment is subdivided into pixels blocks of size 8× 8 (64pixels), and zigzag reordered. The DCT of the block is then computed. Then, a pseudorandom sequence of real numbers is embedded in the DCT domain of each image segment. Different experiments are conducted to show the performance of the scheme under different types of attacks. The results show that our proposed watermark scheme is robust to common signal distortions, including geometric manipulations.
Keywords: Discrete cosine transform (DCT), digital watermarking, image segmentation
1. INTRODUCTION
Most watermarking research and publications are focused on digital images. The reason might be that there is a large demand for image watermarking products due to the fact that there are so many images available at no cost on the World Wide Web which need to be protected. Meanwhile, the number of image watermarking publications is too large. However, most techniques share common principles. The watermark signal is typically a pseudorandom signal with low amplitude, compared to the image amplitude, and usually with spatial distribution of one information (i.e., watermark) bit over many pixels.
A lot of watermarking methods are in fact very similar and differ only in parts or single aspects of the three topics, signal design; embedding; and recovery. The information that is embedded is usually not important for the watermarking itself. However, there are methods that are designed to embed and extract one out of a codebook of codes, and thus cannot accommodate arbitrary information. Other proposed schemes modulate the codes available in the codebook with arbitrary information bits and can thus accommodate arbitrary messages.
The watermark signal is often designed as a white or colored pseudorandom signal with, e.g., Gaussian, uniform or bipolar probability density function. In order to avoid visibility of the embedded watermark, an implicit or explicit spatial or spectral shaping is often applied with the goal to attenuate
the watermark in areas of the image where it would otherwise become visible. The resulting watermark signal is sometimes sparse and leaves image pixels unchanged, but mostly it is dense and alters all pixels of the image to be watermarked. The watermark signal is often designed in the spatial domain [1],[2],[3],[4],[5] and [6], but sometimes also in a transform domain like the full-image discrete cosine transform (DCT) domain, block-wise DCT domain [7], [8],[9],[10] and discrete wavelet transform (DWT) [11],[12].
The signal embedding is done by addition or signal-adaptive (i.e., scaled) addition, mostly to the luminance channel alone, but sometimes also to color channels, or only to color channels. The addition can take place in the spatial domain, or in transform domains such as the discrete Fourier transform (DFT) domain, the full-image DCT domain, the block-wise DCT domain [7],[8],[9], the wavelet domain [11],[12], the fractal domain, the Hadamard domain, the Fourier–Mellin domain, or the Radon domain. It is often claimed that embedding in the transform (mostly DCT or wavelet) domain is advantageous in terms of visibility and security.
The main contribution of this paper is to present a new watermarking scheme that is based on expectation maximization (EM) segmentation algorithm and discrete cosine transform (DCT). Section 2 presents the main requirements and applications of watermarking. Section 3 discusses the image s
egmentation techniques. The proposed watermarking scheme is presented in Section 4. This is followed by the experiment results in Section 5. Finally, the conclusions are presented in Section 6.
2. IMAGE WATERMARKING REQUIREMENTS AND APPLICATIONS
Each watermarking application has its own specific requirements. Therefore, there is no set of requirements to be met by all watermarking techniques.
Perceptual Transparency: In most applications the watermarking algorithm must embed the watermark such that this does not affect the quality of the underlying host data. A watermark-embedding procedure is truly imperceptible if humans cannot distinguish the original data from the data with the inserted watermark. Even the smallest modification in the host data may become apparent, however, when the original data is compared directly with the watermarked data. Since users of watermarked data normally do not have access to the original data, they cannot perform this comparison. Therefore, it may be sufficient that the modifications in the watermarked data go unnoticed as long as the data are not compared with the original data.
Robustness: It is desirable that the watermark always remains in the host data, even if the quality of the host data is degraded. Examples of degradations are lossy compression techniques, filtering, re-
modulatesampling, digital-analog (D/A) and analog-digital (A/D) conversion.
There are many applications for watermarking including copyright protection, fingerprinting, copy protection, broadcast monitoring, data authentication, indexing, medical safety, and data hiding.
There are three main issues in the design of a watermarking system [1]: •Design of the watermark signal to be added to the host signal. Typically, the watermark signal depends on a key and watermark information.
•Design of the embedding method itself that incorporates the watermark signal into the host data yielding watermarked data.
• Design of the corresponding extraction method that recovers the watermark information from the signal mixture using the key and with help of the original or without the original
The first two issues, watermark signal design and watermark signal embedding, are often regarded as one, specifically for methods were the embedded watermark is host signal adaptive.
Watermark and/or
(a) (b)
Figure 1. Digital watermarking embedding and detecting systems
Figure 1 illustrates the concept. Figure 1(a) shows the generic watermarking scheme for the embedding process. The input to the scheme is the watermark, the host data, and an optional public or secret key. The host data may, depending on the application, be uncompressed or compressed, however, most proposed methods work on uncompressed data. The watermark can be of any nature,
such as numbers, text, or an image. The generic watermark recovery process is depicted in Figure 1(b). Inputs to the scheme are the watermarked data, the secret or public key, and, depending on the method, the original data and the original watermark. The output of the watermark recovery process is either the recovered watermark or some kind of confidence measure indicating how likely it is for the given watermark at the input to be present in the data under inspection.
3. IMAGE SEGMENTATION TECHNIQUES
A central problem, called segmentation , is used originally to distinguish objects from background or objects from each other. For intensity images (i.e., those represented by point-wise intensity levels) four popular approaches are: threshold techniques, edge-based methods, region-based techniques, and connectivity-preserving relaxation methods.
Segmentation algorithms also include expectation-maximization algorithm [13], K-means algorithm [14], and other clustering techniques such as QT clustering algorithm and Fuzzy c-means clustering algorithm. In statistical computing, the expectation-maximization (EM) algorithm [13] is an algorithm for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. EM is frequently used for data clustering in machine learnin
g and computer vision. EM alternates between performing an expectation step, which computes an expectation of the likelihood by including the latent variables as if they were observed, and a maximization step, which computes the maximum likelihood estimates of the parameters by maximizing the expected likelihood found on the expectation step. The parameters found on the maximization step are then used to begin another expectation step, and the process is repeated.
The K-means algorithm [14] is an algorithm to cluster objects based on attributes into k partitions. It is a variant of the expectation-maximization algorithm in which the goal is to determine the k means of data generated from gaussian distributions. It assumes that the object attributes form a vector space. The objective it tries to achieve is to minimize total intra-cluster variance. The algorithm starts by partitioning the input points into k initial sets, either at random or using some heuristic data. It then calculates the mean point, or centroid, of each set. It constructs a new partition by associating each point with the closest centroid. Then the centroids are recalculated for the new clusters, and algorithm repeated by alternate application of these two steps until convergence, which is obtained when the points no longer switch clusters (or alternatively centroids are no longer changed). The algorithm has remained extremely popular because it converges extremely quickly in practice. In fact, many have observed that the number of iterations is typically much less than the number of poin
ts. 4. PROPOSED DCT-BASED IMAGE WATERMARKING VIA IMAGE SEGMENTATION TECHNIQUES
Inspired by some of the ideas proposed by Cox et al. [7] and the algorithm in [8], we have constructed our algorithm. In [8] their algorithm rather than embedding the watermark globally in the host image as the Cox algorithm, the original image is first segmented based on Voronoi diagram and the feature extraction points.
Our proposed algorithm is based on image segmentation and discrete cosine transform. The image is first segmented using
expectation maximization segmentation algorithm, and then each segment is divided into 8×8 blocks (64 pixels). A zigzag reordering is plied to each block of each segment (see Figure 2). ap
Figure 2. Zigzag reordering algorithm.
For each 8×8 block in the segments a two dimensional discrete cosine transform (2D-DCT) is applied. The DCT coefficients of each segment are then selected to be modified by the watermark in which we embed a pseudorandom sequence of real numbers in the DCT coefficients of each segme
nt of the host image. This will boost the watermark robustness with affecting the invisibility. The embedding of the watermark is applied to each segment of the image.
To get the watermarked image, the reverse process is applied in which the two-dimensional inverse discrete cosine transform (2D-IDCT) is preformed on each 8×8 block of each segment. Each 8×8 block is reordered using dezigzag reordering which is the inverse of the zigzag reordering mentioned above. Finally the segments are merged together to form the watermarked image.
The two dimensional DCT used in our algorithm is given by
∑∑−=−=++=1010
,2)12(cos 2)12(cos ),(),(M x N y v u N v y M
u x y x I v u C ππαα (1) for 10−≤≤M u , 10−≤≤N v and
⎪⎩⎪⎨⎧−≤≤==11201M u M u M u , ,α, ⎪⎩⎪⎨⎧−≤≤==1
1201N v N v N v , ,α (2)
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论