Vous êtes sur la page 1sur 14

Image Watermarking

Feng CHEN
02430339

159.731 Machine Vision Seminar Report


June 2004

Table of Contents
1.

Introduction

2.

Motivation

3.

Approaches of Watermarking

4.

Multi-resolution watermarking

5.

Applications of watermarking

10

6.

Requirements of watermarking

11

7.

Conclusions

12

8.

References

13

1. Introduction
The rapid expansion of the Internet in the past years has rapidly increased the
availability of digital data such as audio, images and videos to the public. As we have
witnessed in the past few months, the problem of protecting multimedia information
becomes more and more important and a lot of copyright owners are concerned about
protecting any illegal duplication of their data or work. Some serious work needs to
be done in order to maintain the availability of multimedia information but, in the
meantime, the industry must come up with ways to protect intellectual property of
creators, distributors or simple owners of such data. This is an interesting challenge
and this is probably why so much attention has been drawn toward the development
of digital images protection schemes. Of the many approaches possible to protect
visual data, digital watermarking is probably the one that has received most interest
The idea of robust watermarking of images is to embed information data within the
image with an insensible form for human visual system but in a way that protects
from attacks such as common image processing operations.
As the computers are more and more integrated via the network, the distribution of
digital media is becoming faster, easier, and requiring less effort to make exact copies.
One of the major impediments is the lack of effective intellectual property protection
of digital media to discourage unauthorized copying and distribution.
1.1 What is a watermark?
A watermark is the hidden information within a digital signal (such as image, video,
audio, polygonal model...).It is integrated into the content of host signal itself, and
requires no additional file header or conversion of data format as well. Moreover, it is
designed to permanently reside in the host data .Finally, unlike encryption; it does not
restrict access to the host data.
1.2 What is a digital watermarking?
Also referred to as simply watermarking, a pattern of bits inserted into a digital image,
audio or video file that identifies the file's copyright information (author, rights, etc.).
The name comes from the faintly visible watermarks imprinted on stationery that
identify the manufacturer of the stationery.
The purpose of digital watermarks is to provide copyright protection for intellectual
property that's in digital format.
Unlike printed watermarks, which are intended to be somewhat visible, digital
watermarks are designed to be completely invisible, or in the case of audio clips,
inaudible. Moreover, the actual bits representing the watermark must be scattered
throughout the file in such a way that they cannot be identified and manipulated. And

finally, the digital watermark must be robust enough so that it can withstand normal
changes to the file, such as reductions from lossy compression algorithms.
Satisfying all these requirements is no easy feat, but there are a number of companies
offering competing technologies. All of them work by making the watermark appear
as noise - that is, random data that exists in most digital files anyway. To view a
watermark, you need a special program that knows how to extract the watermark data.
Watermarking is also called data embedding and information hiding.

2. Motivation
2.1 In the past
Conventionally, in analog world, a painting is signed by the artist to attest the
copyright, an identity card is stamped by the steel seal to avoid forgery, and the paper
money are identified by the embossed portrait. Such kind of hand-written signatures,
seals and watermarks have been used from ancient times as a way to identify the
source, creator of a document or a picture. For example, a priceless painting of the
11th century in National Palace Museum named "Travelers on a Mountain Path" had
not been identified as the genuine work of Fan Kuan until Fan's signature is found
between the woods behind a group of travelers of the painting.

Travelers on a Mountain

Figure 1

Fans signature

2.2 In digital World


However, in the digital world, digital technology for manipulating images has make it
difficult to distinguish the visual truth. Besides, the characteristics of digitization
bring significant hangs in copyright issues, which create an urgent need to intellectual
property protection on the digitally recorded information.
Digital watermarking has been proposed as a way to claim the ownership of the
source and owner. Unlike encryption, watermarking does not restrict access to the
data. Once the encrypted data is decrypted, the intellectual property rights are no
longer protected.
Over the past few years, the technology of the digital watermarking has gained
prominence and emerged as a leading candidate that could solve the fundamental
problems of legal ownership and content authentications for digital multimedia data.
A great deal of research efforts has been focused on digital image watermarking in
recent years. The techniques proposed so far can be divided into two groups according
to the embedding domain.
One group is spatial domain approach.
5

The other group is frequency domain approach.

3. Approaches of watermarking
3.1 Spatial Domain Approach
The earliest watermarking techniques are mainly this kind and the simplest example is
to embed the watermark into least significant bits (LSBs) of the image pixels.
However, this technique has relatively low information hiding capacity and can be
easily erased by lossy image compression.

3.2 Frequency Domain Approach


Another way to produce high quality watermarked image is by first
transforming the original image into the frequency domain by the
use of Fourier, Discrete Cosine or Wavelet transforms for example.
And it can embed more information bits and is relatively robust to
attack. With this technique, the marks are not added to the
intensities of the image but to the values of its transform
coefficients. Then inverse-transforming the marked coefficient forms
the watermarked image. The use of frequency based transforms
allows the direct understanding of the content of the image;
therefore, characteristics of the human visual system (HVS) can be
taken into account more easily when it is time to decide the
intensity and position of the watermarks to be applied to a given
image.
3.2.1 Examples of Implementation
1. Cox et al. used the spread spectrum communication for digital
multimedia watermark.
2. Hsu and Wu embedded an image watermark into selectively
modified middle frequency of discrete cosine transform (DCT)
coefficients of container image.
3. Joseph et al. developed a digital image watermarking using the
Fourier-Mellin transform that is invariant to image manipulations or
attacks due to rotation, scaling and translation.
Several other methods used discrete wavelet transform to hide
the data to the frequency domain.

4. Multi-resolution Watermarking

4.1 Description
Here, I am going to discuss an example on watermarking method proposed by
Ward .This first generation technique called Multi-resolution Watermark for Digital
Images works in the wavelet domain.
The modus operandi is pretty simple since it consists of adding weighted pseudorandom codes to the large coefficients at the high and medium frequency bands of the
discrete wavelet transform of an image. Even if it might first appear theoretically
straightforward the actual implementation is a little more complicated than it seems
and great effort will be made here to clarify it.
First of all, one must know why the wavelets approach is used here. The
characteristics of this transform domain are well suited for masking consideration
since it is well localized both in time and frequency. Besides wavelet transforms
match the multi channel model of the HVS so one can actually set a numerical limit to
the wavelets coefficients alteration in order to stay under the HVS just noticeable
difference 3 (JND), for which our eyes start to become aware of the modifications in
the image . Besides, wavelet transforms is a part of upcoming compression standards
(such as JPEG-2000) so wavelet-based techniques would allow a much easier and
optimized way to include a copyright protection device in the compression code itself.

A second important aspect of the technique used here is the


way to introduce a watermark in an image. A watermark
should be introduced in perceptually significant regions of the
data in order to remain robust. However, by doing so, we risk
to alter the image (i.e. perceivably). The technique described
here follows to a certain degree this requirement but tries to
make the introduced watermark as invisible as it can while
showing good robustness. As the reader will understand, we
have chosen to ensure transparency of the watermark and, in
the same time keep the robustness by embedding the
information within only the high and medium frequencies while
keeping third resolution low frequencies, for which the HVS is
most sensitive, untouched. The implemented technique uses
no oblivious watermark. In copyright protection, it is
reasonable to assume that the owner or the user who wants to
verify the presence of a particular watermarking key has
access to the original un-watermarked image. This type of
watermarking scheme is called non-oblivious (or private)
watermarking in opposition to oblivious (or public) techniques,
such as copy protection, where the original image is not
accessible.

4.2 Steps of Implementation


7

4.2.1 Encoder
The first part of the watermarking process is, of course, the encoder.
The first step is to decompose the image into ten frequency bands
using three resolutions of Haar wavelets.

Figure 2s bank of filters represents well the idea of the octave-band structure of Haar
wavelets, which gives pyramid structure frequency localization as shown in Figure 3.

Here, I must point out that an under sampling operation is done after every filtering. It
must be understood that the choice of the Haar wavelet in our system was one made
for simplicity. However, we had in mind to investigate the influence of the choice of
the wavelet function in our results but, in order to test the robustness truthfully, we
had to give up the idea in favor of the addition of extra robustness testing procedures.
The next operation is to add a pseudo random sequence N , in fact a Gaussian
distribution of mean zero and variance one, to the coefficients of the medium and high
frequency bands (i.e. all the bands except the lowest one which is represented by the
top left corner in Figure 3). The normal distribution is used because it has been
proven to be quite robust to collusive attacks. In order to weight the watermark
according to the magnitude of the wavelet coefficients, we used one of the two
following relations between the original coefficients y and , the ones containing the
watermark:

[m,n] = y[m,n] + alpha (y[m,n])2 N[m,n] ( 1 )


&
[m,n] = y[m,n] + alpha . abs(y[m,n]) N[m,n] ( 2 )

It must be pointed out that the relations (1) and (2), even though they are
mathematically different, have the exact same goal which is to put more weight to the
watermark added to high value wavelet coefficients. The parameter alpha is to control
the level of the watermark; it is in fact a good way to choose between good
transparency or good robustness or a tradeoff between the two. Finally, the twodimension inverse wavelet transform of is computed to form the watermarked
image.

Figure 4 gives a good idea of the main components of the encoder

4.2.2 Decoder
At the other end of the communication channel, a decoder is used to extract the
watermarked information from the received image. Upon reception of the supposedly
watermarked image, the algorithm first isolates the signature included in this image
by comparing the DWT coefficients of the image with those of the original (nonwatermarked) one. The following operation consists of taking the identified key to put
in contrast with the found signature by computing the cross-correlation at the first
resolution level (i.e. highest frequency coefficients). The watermark is called detected
if there is a peak in the cross-correlation corresponding to a positive identification. If
there is no central peak, the decoder adds the second resolution level (i.e. the bottom
left square in the pyramid structure of Figure 3) to the computation aiming at finding
for a peak. Once again, if there is a peak, the watermark is called detected and if not,
we go to the third resolution and so on until we reach the ninth resolution limit.

4.3 Advantage of this technique


The main advantage of this technique is that while allowing good detection, even in
the presence of corruption, it keeps the level of false positive detection to a minimum
since the found signature has to go through detection step of positive identification to
be called detected. The detector step aims at ensuring the maximum exactitude in the
detection of the owner identification key and, as said previously, minimizing the
number of false positive detection. The results presented later on should convince the
10

reader of the performance of our decoder.

5. Applications of Watermarking
5.1 Fingerprinting
In order to trace the source of illegal copies the owner can embed
different watermarking keys in the copies that are supplied to
different customer. For the owner, embedding a unique serial
number-like watermark is a good way to detect customers who
break their license agreement by copying the protected data and
supplying it to a third party.

5.2 Indexing
Watermarking offers a wide range of new capabilities to multimedia
applications. It allows the indexing of video mail by permitting the
insertion of comments in video content as well as the indexing of
movies or news items by making available the utilization of markers
that can be exploited in search engines. As the number of images
and video contents online increases a lot faster than the capabilities
of todays search engine, it is important to plan ahead for new ways
to allow quick access to multimedia data and watermarking is
certainly a promising way to do so.

5.3 Copyright Protection & Owner identification:


To protect its intellectual property, the data owner can embed a watermark
representing copyright information of his data. This application can be a really helpful
tool in settling copyright disputes in court. It is probably the most widely spread use
of digital images watermarking and it is also the application we have worked on in the
present project.

5.4 Broadcast monitoring:


In order to help the automated identification of broadcasted programs, original
watermarks can be inserted in any type of data to be widely broadcasted on a network.
It could assure that advertisers received the airtime they have paid for or make certain
that musicians property is not rebroadcast by pirate stations (or at least, if so, that it
can be detected).

5.5 Copy protection:


The watermarked information can directly control digital recording device. The
embedded key can represent a copy-permission bit stream that is detected by the
recording device which then decide if the copying procedure should go on (allowed)
or not (prohibited).

5.6 Data Authentication:


Fragile watermarks are used to detect any corruption of an image or any other type of
11

data. If the watermark is detected, the data is genuine, if not, the data has been
corrupted and cannot be considered.

5.7 Data Hiding (Covert Communications):


The transmission of private data is probably one of the earliest applications of
watermarking. As one would probably have already understood, it consists of
implanting a strategic message into an innocuous one in a way that would prevent any
unauthorized person to detect it.

5.8 Medical Safety:


Embedding the date and patients name in medical images could increase the
confidentiality of medical information as well as the security.

6. Requirements of Watermarking
To achieve maximum protection of intellectual property with watermarked media,
several requirements must be satisfied:

6.1 Imperceptible
The watermark should be imperceptible so as not to affect the viewing experience of
the image or the quality of the audio signal.

6.2 Undeletable
The watermark must be difficult or even impossible to remove by a hacker, at least
without obviously degrading the host signal.

6.3 Statistically Undetectable


A pirate should not be able to detect the watermark by comparing several
watermarked signals belonging to the same author.

6.4 Robustness
6.4.1 The watermark should be survive the lossy compression techniques like JPEG,
which is commonly used for transmission and storage.
6.4.2 The watermark should still be retrievable even if common signal processing
operation are applied, such as signal enhancement, geometric image operations, noise,
filtering, and etc.

6.5 Unambiguous
Retrieval of the watermark should be unambiguously identify the owner, and the
accuracy of identification should degrade gracefully in the face of attacks

7. Conclusions
As we have witnessed in the past few months, the problem of
protecting multimedia information becomes more and more
important and a lot of copyright owners are concerned about
protecting any illegal duplication of their data or work. Some
serious work needs to be done in order to maintain the
availability of multimedia information but, in the meantime,
the industry must come up with ways to protect intellectual
property of creators, distributors or simple owners of such
12

data.
This is an interesting challenge and this is probably why so
much attention has been drawn toward the development of
digital images protection schemes.
Of the many approaches possible to protect visual data, digital
watermarking is probably the one that has received most
interest. The goal of digital watermarking is to produce an
image that looks exactly the same to a human eye but still
allows its positive identification in comparison with the owner's
key if necessary.

8. References
[1] I J Cox , M L Miller and J A Bloom , Watermarking Applications and
their Properties .
[2] A H Paquet , R K Ward , Wavelet Based Digital Watermarking
13

[3] G Voyatzis and I Pitas , The Use Of Watermarks in the Protection of


Digital Multimedia Products .
[4] H Y Lo , S Topiwala and J Wang , Wavelet Based Steganography and
Watermarking .
[5] http://www.webopedia.com/TERM/D/digital_watermark.html

14

Vous aimerez peut-être aussi