Paper Watermarking 2006
Paper Watermarking 2006
Dr. Fazal-ur-Rehman, Zahid Iqbal, Shaukat Iqbal, Muhammad Zafar Javed Shahid
Ghulam Ishaq Khan Institute of Engineering and Technology Pakistan
Email: [email protected], [email protected], [email protected], [email protected]
9
diagram as shown in fig 1. Discrete Wavelet transform
is used to split this medium frequency to sub-bands.
Input The low-low band is selected for inserting the
Image watermarked image.
The embedder operates in such a way that it generates a
DCT pseudo-number according to a key and insert these
pseudo-number at low-low band only when a pixel
value of Watermark is zero. This process repeats equal
Tansformed
Image
Pre
Procesing
Watermarked
1/4 TC of Tr_Image Image
DCT
DWT
Key
LL LH Tansformed
Rand Image
HL HH
Pre
Procesing
Pn-Seq logo(k)
+ == 0
Yes No
1/4 TC of Tr_Image
LL LH DWT
HL HH
LL LH
IWT
HL HH
Logo(K)=0
Yes
Post
Procesing
Correlation >Threshold
PN-Seq No
IDCT
Rand Logo(K)=1
Watermarked
Image
Key
10
to the size of the logo. After adding pseudo-number at
low-low band, the image is reconstructed ,i-e IDWT is
taken and then low and high frequencies transform
coefficient are concatenated .This is done by the post
processor component in the block diagram of embedder
in fig 1. After that Inverse Discrete Cosine Transform is
taken to form watermarked image.
3 SIGNAL TRANSFORMATION
ATTACKS
This watermark has been tested for the following signal
transformation:
I. Watermarked image was encoded using JPEG
(Discrete Cosine Transform based
compression technique) and then decoded and
watermark was retrieved successfully from the
image. The original size of the watermarked
image was 258kb as shown in fig3. After
compression, its size was 42kb. The
compressed image was decoded and
watermark was still detectable.
II. Watermarked image was encoded using
Figure 4. Watermarked Image”
JPEG2000 (wavelet based compression
technique) and again after decoding,
watermark was retrieved successfully. Size of
compressed image was 36kb.
III. Gaussian Random Noise of zero mean and
variance “3” was added to the watermarked
image and after that, watermark was still
detected successfully.
IV. Low Pass filtering was applied to
watermarked image and after that, watermark
was still detectable.
V. High Pass Filtering was applied to
watermarked image and it proved to be robust ═Figure 5 – Digital Signature used as Watermark”
for this signal transformation process too.
11
4 CONCLUSIONS
In this paper, an algorithm is presented for embedding
of Watermark in an image and its extraction. In our
technique, we have selected a moderate band of
frequencies which are neither so low that it becomes
visible nor so high that it gets filtered out. Also it is
robust for classical as well as multi-resolution
compression techniques. The watermark has been tested
for certain attacks and it has proved to be robust enough
to use it in any of the compression techniques. At the
same time, the algorithm works fine in real time
environment and it takes the least processing power.
5 REFERENCES
[1] G. Voyatzis, N. Nikolaidis and I. Pitas, “Digital
watermarking: An overview,” EUSIPCO-98, Greece, Sept.
1998, vol. 1, pp. 9-12.
[2] R. G. van Schyndel, A.Z.Tirkel, N.R.A Mee, C.F.
Osborne, “A digital watermark,” Proceedings of the IEEE
International Conference on Image Processing, Austin, Texas,
USA, November, 1994, vol. 2, pp. 86- 90.
[3] R. G. van Schyndel, A. Z. Tirkel, C. Osborne, “Towards a
robust digital watermark,” Proceedings of the ACCV-95
Conference, Nanyang Technological University, Singapore,
December 5-8, 1995.
[4] A. Tirkel et al., “Electronic Watermark,” Digital Image
Computing, Technology and Applications—DICTA 93,
Maquarie University, Sidney, 1993, pp. 666-673.
[5] I. Cox et al., “Secure Spread Spectrum Watermarking for
Multimedia,” IEEE Trans. on Image Processing, Vol. 6, No.
12, Dec. 1997, pp. 1673-1687 (originally published in 1995 as
NEC TR 95-10).
[6] N. Kaewkamnerd and K.R.Rao, “Wavelet based
watermarked image detection using Multiresolution image
registration method,” TENCON 2000, Kuala Lumpur,
Malaysia, Sept. 2000.
12