Title: Digital Watermarking
1Digital Watermarking
-
- Annual Progress Seminar III
- Jayalakshmi. M
- Roll NO. 03407003
-
- Guided by
- Prof. S. N. Merchant
2Previous work (Annual Progress Seminar 12)
- Significant pixels in wavelet domain for robust
watermarking - Quantization of significant pixels with respect
to HVS model - Watermarking in Contourlet Domain - Non-blind
methods - Found suitable for images like maps which contain
lot of lines, texts and curves - Error Concealment using Watermarking (DCT and DWT
domain) -
-
3Overview
- Wavelet Domain Watermarking
- - Significant pixels with quantization given
by HVS model with a single copy of the watermark - - Chair -Varshney rule for improved
detection when multiple copies are inserted - Watermarking in Contourlet Domain
- -Non-blind techniques
- -Application mainly in geographical maps
- -Blind watermarking in contourlet domain -
improved detection after filtering - Error Concealment by Watermarking
- Improvement in DCT domain - - Wavelet domain
41. Significant Pixel Watermarking in Wavelet
Domain
- Significance factor for each pixel
- Quantization of highest significant pixels with
respect to HVS model -gives maximum allowable
quantization for every pixel at any resolution - No pixel in the original image carries more than
one watermark bit
5Result 16x16 binary watermark
Watermarked
Original
6Results of wavelet domain significant pixel
watermarking
- PSNR for invisibility
- Correlation coefficient after attacks like
- -mean filtering, Gaussian noise addition,
- salt pepper noise addition with median
filtering, quantization ,JPEG compression
cropping - Cases considered- 2,3 4 level decomposed image
with and without significant pixels. - Performance evaluated with 16x16, 32x32 binary
watermark and pseudorandom watermark
7Results of wavelet domain significant pixel
watermarking
- Retrieval with significant pixels better than
the highest absolute pixels - Significance factor becomes meaningful as moved
towards higher decomposition levels - The distortion to the image should be kept to
minimum- 3rd decomposed level was found a good
choice for embedding - Since a single copy of watermark is embedded,
cropping any part of visual importance will not
result in detection
8Chair- Varshney rule with multiple copies of
watermark
- Multiple copies of watermark (K)
9Pd and Pm for each bit
- Both Pd and Pm are fixed for all the bits in
every copy of the watermark - Then, these values are increased or decreased
depending on whether a correct detection has
taken place or not - This could give rise to false positives
10Results with CV rule
- Correlation coefficients after JPEG compression
11Results with CV rule
- JPEG compressed image (Q3) and retrieved
watermarks
CV rule
Majority rule
12Results with CV rule
- Correlation coefficients after mean filter and
mean filter with JPEG compression (Q10)
13Results with CV rule
- Mean filtered and compressed image (Q10) and
retrieved watermarks
CV rule
Majority rule
14Results with CV rule
- Correlation coefficients after histogram
equalization
15Results with CV rule
- Histogram equalized and retrieved watermarks
CV rule
Majority rule
16Results with CV rule
- Correlation coefficients after Gaussian blur
17Results with CV rule
- Gaussian blurred image and retrieved watermarks
CV rule
Majority rule
18Results with CV rule
- Correlation coefficients after pixelization
19Results with CV rule
- Pixelized image and retrieved watermarks
CV rule
Majority rule
20False Positives with Random Watermarks
- 200 random samples of watermark
212. Contourlet Domain Methods
- Sparse representation of 2-D piecewise smooth
signals - 2-D wavelets formed by tensor product of 1-D
wavelets are good at catching discontinuities at
edge points - Wavelets do not see smoothness along the contours
- Contourlets make use of Pyramidal Directional
Filter Bank (PDFB) - PDFBLPDFB
22Directional decomposition used in proposed methods
23Method 1- High absolute coefficients
- Directional decomposition doubles at every scale
- Highest absolute coefficients in D is watermarked
- DDa m
24Method 2 (Significance factor)
25Generalized Neighborhood
26Watermarked Images
Wavelet based
27Watermarked Images
Highest absolute pixel (Multiple6)
Significant pixel (Multiple3)
28Watermarked Images
Gen. neighborhood
Highest abs. (curve scale)
29Watermarked Images
DCT
Hadamard
30Retrieved watermarks after mean filtering
Wavelet (wave4)
Highest absolute pixels(multiple6)
Significant pixels(multiple3)
Gen. neighborhood(gen1)
Curve scaling relation(gen2)
DCT Hadamard
31Conclusion Non-blind techniques in contourlet
domain
- Contourlet based algorithms performed better than
wavelet, DCT Hadamard transform domain methods
in images like maps - Significant pixels in contourlet domain were
found the best choice for watermark embedding for
images containing lot of curves and texts - l
32Blind Watermarking in Contourlet Domain
- Contourlet decomposition of images
- Binary watermark embedded using spread spectrum
method - Additive embedding is performed
- Robustness verification is done using Stir Mark
attack - Recovered watermark is evaluated by finding its
correlation with original logo - The visual similarity is improved by median
filtering of the retrieved logo
33Additive Embedding
- Y Set of original pixels
- Y Corresponding watermarked pixels
- PPseudorandom sequence generated using a key
- w watermark bit
-
Original image
Water- marked image
Pseudo random sequence
key
34Embedding- Results
- Original image Logo
Watermarked image
35Embedding- Results
36Retrieved logo
- Retrieved logo with authorized key
- Retrieved logo with unauthorized key
- Retrieved logo after post processing
37Correlation coefficients with a
38Correlation coefficients after attacks
39Mean filtering (256x256, a0.225)
- Mean filtered image Retrieved logo
After post-processing -
g0.7077 g 0.8704
40Quantization to multiples of 50 (256x256,
a0.225)
- Quantized image Retrieved logo
After post-processing
g0.7914 g 0.9301
41Quantization to multiples of 100 (256x256,
a0.225)
- Quantized image Retrieved
logo After post-processing
g0.6808 g 0.8332
42JPEG Compression (Q40) (256x256, a0.225)
- Quantized image Retrieved
logo After post-processing
g0.6939 g 0.8419
43Watermarked Image with 128x384 Coefficients
(a0.275)
- Watermarked Retrieved logo
After post-processing
g0.8021 g0.9438
g0.8322 g0.9735
44Mean filtering with 128x384 Coefficients
Watermarked ( a0.275)
- Mean filtered image Retrieved
logo After post-processing
g0.7280 g 0.8984
45Mean filtering with 128x384 Wavelet Coefficients
Watermarked (a0.275)
- Mean filtered image Retrieved logo
After post-processing -
g0.6682 g 0.8341
46Conclusion blind watermarking in contourlet
domain
- Blind watermarking in contourlet decomposed
images is performed using spread spectrum
technique - Correlation based detection is improved using
post processing after detecting all the bits - Shows good robustness against attacks
- Directional bands can be effectively used to
achieve robustness against geometrical attacks
473. Error Concealment Using Watermarking
- Watermark derived from image itself
-
48Algorithm
- Approximate band embedded in LH1 HL1
- N x N approximate band represented by 8N2 bits
- LH1 HL1 together gives 32N2 bits
- 4 copies of watermark hidden with a shift in the
bit stream - Sign of every pixel remains unchanged after
embedding - Completely blind algorithm
- Results compared with BNM technique
-
49Results of EC in DWT domain -8X80 block errors
PSNR18.94 PSNR
33.4 PSNR 32.58
Error image Proposed
method BNM
50Error Concealment in DCT Domain
- Existing algorithm embeds ROI into ROB in spatial
domain - ROI embedded into the compressed JPEG bit streams
- Good resistance to compression
- 32x32 ROI into the JPEG quantized pixels through
LSB substitution - Only 7th to 16th pixels in the zigzag scanned
pattern of each 8x8 block in textured regions are
selected for hiding the watermark bits.
51Results with medical image
- ROI defined on the fracture
52Results with only ROI embedded(after compression)
53Results with only ROI embedded(after compression)
54Results with only ROI embedded(after compression)
- PSNR of error concealed ROI
55Error Concealment through watermarking
- DWT domain algorithm has two levels of security
using a scale factor and a key for pseudorandom
generation - Also efficiently conceals error in any part of
the image - DCT based method needs lot of texture region in
the ROB for hiding the watermark and ROI defined
is small compared to the size of the image
56Future work
- Improvement in error concealment and PAPR with
redundancy in MC-CDMA systems - Effect of super resolution on watermarking
57Thank you