A Feature-based Robust Digital Image Watermarking Against

International Journal of Automation and Computing
04(4), October 2007, 428-432
DOI: 10.1007/s11633-007-0428-2
A Feature-based Robust Digital Image Watermarking
Against Desynchronization Attacks
Xiang-Yang Wang1,2,∗
1
2
Jun Wu1
School of Computer and Information Technique, Liaoning Normal University, Dalian 116029, PRC
State Key Laboratory of Vision and Auditory Information Processing, Peking University, Beijing 100871, PRC
Abstract:
In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to
extract feature points, which can survive a variety of attacks. The local characteristic regions (LCRs) are adaptively constructed based
on scale-space theory. Then, the LCRs are mapped to geometrically invariant space by using image normalization technique. Finally,
several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete
Fourier transform (DFT) coefficients. By binding a watermark with LCR, resilience against desynchronization attacks can be readily
obtained. Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common
signals processing and desynchronization attacks.
Keywords:
1
Image watermarking, desynchronization attacks, feature points, discrete Fourier transform.
Introduction
Digital watermarking, as a kind of efficient supplemental method of a traditional cryptographic system, has been
widely used for intellectual property protection of multimedia in the Internet. However, the attacks against the watermarking system have become more sophisticated with the
development of image watermarking in recent years. Desynchronization attacks, which induce synchronization errors
between the original and the extracted watermark during
the detection process, are very difficult to tackle. Most of
the previous schemes show severe problems to desynchronization attacks[1,2] .
Fortunately, several approaches to count the desynchronization attacks have been developed. These schemes
can be roughly classified into three categories: invariant transform[3,4] , template insertion[5] , and content-based
synchronization[6−8] . The approach in this paper belongs
to the third category. However, the recent schemes against
desynchronization attacks remain immature. The first and
second categories can only be robust against global affine
transformation, such as rotation, scaling and translation
(RST), but vulnerable to shearing and random bending attack (RBA). The last category is robust to shearing and
RBA, but hardly survive scaling.
In this paper, a robust content-based watermarking scheme is developed. The Harris-Laplace detector is
adopted to extract scale-space feature points and the characteristic scale is used to adaptively determine the size of
local characteristic region (LCR), which is helpful to reManuscript received May 29, 2006; revised December 17, 2006.
This work was supported by Natural Science Foundation of Liaoning
Province of China (No. 20032100), Open Foundation of State Key
Laboratory of Vision and Auditory Information Processing (Peking
University) (No. 0503), Natural Science Foundation of Dalian City of
China (No. 2006J23JH020), Open Foundation of Jiangsu Province
Key Laboratory for Computer Information Processing Technology
(Soochow University)(No. KJS0602), Open Foundation of Key Laboratory of Image Processing and Image Communication (Nanjing University of Posts and Communications) (No. ZK205014).
*Corresponding author. E-mail address: [email protected]
duce the watermark synchronization problem between the
watermark embedding and detection. In experiments, we
will compare the performance of the proposed scheme with
that of another content-based scheme by applying the various attacks. The results show the appropriateness of the
proposed method for robust watermarking.
2
LCR construction based on scalespace feature points
In content-based synchronization approaches, feature
points, as marks for location resynchronization between
the watermark embedding and detection, must be robust
against various types of common signal processing and geometric distortions. The Harris-Laplace detector was proposed by Mikolajczyk[9] and proved to be invariant to image
rotation, scaling, translation, partical illumination changes,
projective transform, etc. Therefore, we adopt and modify
this method for the watermarking purpose. The details of
the Harris-Laplace detector and the construction of LCR
are described in the next subsections.
2.1
Scale adapted Harris detector
The Harris detector is based on a specific image descriptor called second moment matrix, which reflects the local
distribution of gradient directions in the image. This matrix
must be adapted to scale changes to make it independent
of the image resolution. The scale-adapted second moment
matrix is defined by
µ(x, y, δI , δD") =
2
δD
· G(δI ) ∗
L2x (x, y, δD )
Lx Ly (x, y, δD )
#
Lx Ly (x, y, δD )
L2y (x, y, δD )
(1)
where δI and δD are the integration scale and differentiation
scale, respectively, and La is the derivative computed in the
a direction, and “∗” denotes the linear convolution. The
scale-space representation is a set of images represented at
X. Y. Wang and J. Wu/ A Feature-based Robust Digital Image Watermarking Against Desynchronization Attacks
different levels of resolutions. Given δD , the uniform Gaussian scale space representation L is defined by
L(x, y, δD ) = G(x, y, δD ) ∗ f
(2)
where G is the associated uniform Gaussian kernel with
standard deviation δD and mean zero, f is an image, and
“∗” denotes the linear convolution.
Given δI and δD , the multi-scale Harris corner strength
(MSCS) can be computed by using the determinant and the
trace of the second moment matrix, i.e.,
R(x, y, δI , δD ) =
det (M (x, y, δI , δD )) − k · tr2 (M (x, y, δI , δD ))
(3)
where det(·) and tr(·) denote the determinant and the trace
of matrix, respectively. At each level of the scale-space, the
feature points are extracted as the local maxima in the image plane as follows:
R(x, y, δI , δD ) > R(x̂, ŷ, δI , δD ),
R(x, y, δI , δD ) ≥ tu
∀(x̂, ŷ) ∈ A
(4)
where A and tu are the neighborhood of point (x, y) and
the threshold, respectively.
2.2
Automatic scale selection and scaleinvariant feature points
The idea of automatic scale selection is to select the characteristic scale of the local structure, for which a given
function attains an extremum over scales. The characteristic scale reflects the maximum similarity between the
feature extraction operator and the local image structures.
This scale estimate will obey perfect scale invariance under
rescaling of the image pattern. In this paper, Laplacian of
Gaussians (LOG) is used to find the characteristic scale.
The LOG is defined by
˛ 2
˛
˛ ∂ G(x, y, δI )
∂ 2 G(x, y, δI ) ˛˛
LOG(x, y, δI ) = δI2 ˛˛
+
˛ . (5)
∂x2
∂y 2
Given a point in the image and a set of scales, the characteristic scale is the scale at which the LOG attains a local
maximum over scales.
The extraction of the feature points by using HarrisLaplace detector consists of two steps:
Step 1. Build a scale-space representation with the Harris function for pre-selected scales δn = 1.4 ξ n , where ξ is
the scale factor between successive levels (set to 1.4). At
each level of the representation, the scale adapted Harris
corner strength (SHCS) is computed with the integration
scale δI = δn and the local scale δD = sδn , where s is
a constant (set to 0.7). We then extract the candidate
points which are the maxima in the 8-neighborhood and
their SHCS are higher than the threshold tu = 1 000.
Step 2. For each candidate point, we use an iterative
method to determine the final location and the characteristic scale of the feature points. The extrema over scale of the
LOG are used to select the scale of feature points. Given an
initial point p with the scale δI , the iteration steps include:
Step 2.1 Find the local extremum over the scale of the
LOG for the point pk , otherwise reject the point. The investigated range of scales is limited to
(k+1)
δI
(k)
= t · δI
429
with t ∈ [0.7, 0.8, · · · , 1.4] .
(k+1)
Step 2.2 For the selected δI
, detect the spatial point
pk+1 of the maximum MSCS nearest to pk .
(k+1)
(k)
Step 2.3 Go to Step 1 if δI
6= δI or pk+1 6= pk .
2.3
Scale adapted LCRs
LCRs are the subsets of the host image and used for watermark embedding and detection regions. Therefore, the
problem of geometric synchronization must be considered
by the LCR construction method. In this section, a new
construction method based on characteristic scale is proposed.
Generally speaking, the LCRs can be formed with any
shape such as triangle, rectangle and circle. However, it
is necessary to assure that the LCRs are invariant to rotation, so the circle can be available. Moreover, the size of
the LCR should vary with the image scale in order to resist
the scaling distortion, so the characteristic scale is helpful
to determine the size of the LCRs. The radius R of the
LCRs is defined as
R = τ · [δ]
(6)
where δ is the characteristic scale of the feature points and
τ is a positive integer which is used to adjust the size of the
LCRs. A large value of τ would increase the capacity of the
watermarking system. The robustness of the watermarking system, however, would decrease for a large τ . Hence,
there is a trade off between capacity and robustness. When
there is interference between any two LCRs because the selected LCR is perceptually highly textured, we select the
LCR with a large number of feature points since the LCRs
should not interfere with each other.
3
Watermark embedding
We view all LCRs as independent communication channels. To improve the robustness of transmitted information
(watermark), all channels carry the same copy of the chosen
watermark. The transmitted information passing through
each channel may be disturbed by different types of the intentional and unintentional attacks. During the detection
process, we claim the existence of watermark if at least two
copies of the embedded watermark are correctly detected.
Let0 s decompose the embedding scheme into the following
different steps.
First, the Harris-Laplace detector is adopted to generate
feature points (reference centers) and a set of LCRs is constructed by using these centers. Second, perform the zeropadding operation on every LCR to map the circles (LCR)
to the blocks of size 2R × 2R (R is the radius of the LCR).
Then, perform the image normalization technique[4] on all
blocks. As a result, the blocks are mapped to a geometrically invariant space. Next, a 2-dimensional discrete Fourier
transform (DFT) is applied to these normalized blocks. The
watermark is embedded in the transform domain. Finally,
convert the watermarked blocks0 2-dimensional inverse discrete Fourier transform (IDFT) back to the spatial domain
and apply the inverse of the normalization procedure to
them. The watermarked LCRs are gained by using zero-
430
International Journal of Automation and Computing 04(4), October 2007
removing operation and the original LCRs are replaced by
them.
The procedure of selecting and modifying the magnitude of the DFT coefficients for watermark embedding
is illustrated as follows. First, radius R1 = dR/8e and
R2 = R1 + L ≤ b7R/8c are selected and the annular area
between R1 and R2 covers the mid-frequency components
in the DFT domain, where L denotes the length of the watermark, d·e and b·c denote the upper integer and the lower
integer respectively. Let C(ri ) (i = 1, 2, · · · , L) be the homocentric circles around the zero frequency term, where
R1 ≤ ri ≤ R2 . Then, several middle DFT coefficients are
selected according to the secret key K and we should submit it to the watermark detector. Finally, within C(ri ),
the selected pairs ((xi , yi ), (yi , −xi )), 90◦ apart as shown in
Fig. 1, are modified by using vector quantization:
If wi = 1 then
(M ∗ (xi , yi ), M ∗ (yi , −xi )) =
–
8 „»
M (xi , yi )
>
>
· M (yi , −xi ) · Q,
>
>
M (yi , −x
>
«i ) · Q»
–
>
>
>
M (xi , yi )
>
>
M
(y
,
−x
)
,
%2 = 1
>
i
i
<
M (yi , −xi ) · Q
„»
–
>
M (xi , yi )
>
>
>
+
1
· M (yi , −xi ) · Q,
>
>
M (yi , −x
i ) · Q»
>
«
–
>
>
>
M (xi , yi )
>
: M (yi , −xi ) ,
%2 = 0
M (yi , −xi ) · Q
.
(7)
If wi = −1 then
(M ∗ (xi , yi ), M ∗ (yi , −xi )) =
–
8 „»
M (xi , yi )
>
>
· M (yi , −xi ) · Q,
>
>
M (yi , −x
>
«i ) · Q»
–
>
>
>
M (xi , yi )
>
>
M
(y
,
−x
)
,
%2 = 0
>
i
i
<
M (yi , −xi ) · Q
–
„»
>
M (xi , yi )
>
>
>
+
1
· M (yi , −xi ) · Q,
>
>
M (yi , −x
i ) · Q»
>
«
–
>
>
>
M (xi , yi )
>
: M (yi , −xi ) ,
%2 = 1
M (yi , −xi ) · Q
(8)
where (M ∗ (xi , yi ), M ∗ (yi , −xi )) are the magnitudes of the
altered coefficients at locations (xi , yi ) and (yi , −xi ) in the
DFT domain, and Q is the quantization strength. The
phase of the selected DFT coefficients is not modified. In
addition, to produce a real-valued image after DFT spectrum modification, the symmetric points have to be altered
to the exact same values as well.
4
Watermark detection
The detection process uses the result of the feature point
extraction and consequently performs a resynchronization
of the watermark. If the watermarked image undergoes geometric distortion, the feature points mainly follow the transformation and several LCRs are consequently conserved.
We now detail the different steps of the detection scheme
as follows.
The feature (reference) points are first extracted. All the
reference points are candidate centers of the LCRs. Since
image contents are altered slightly by the embedded watermarks and perhaps by the attacks as well, the LCRs may be
different from those used in the watermark embedding process. Zero-padding is applied to all the LCRs. As a result,
LCRs are mapped to blocks and image normalization is then
applied to all the blocks. In each 2R × 2R DFT block, the
watermark bits are extracted from the DFT components
specified by the secret key in the annular area [R1 , R2 ]. For
an extracted pair ((x̃i , ỹi ), (ỹi , −x̃i )), the embedded watermark bit is determined by the following formula:
8
>
>
>
< 1,
w̃i =
»
>
>
>
: −1,
Pf
disk
=
L
X
„
L
(0.5) ·
r=T
«
L!
.
r!(L − r)!
(10)
Furthermore, an image is claimed watermarked if at least
two disks are detected as “success”. Under this criterion,
the false-alarm probability of one image is
image
=
M
X
i=2
The pairs, 90◦ apart on the DFT plane
(9)
where M̃ (x̃i , ỹi ) and M̃ (ỹi , −x̃i ) are the magnitudes of the
selected coefficients at locations (x̃i , ỹi ) and (ỹi , −x̃i ). The
extracted L bits sequence is then compared with the original embedded watermark to determine the success of the
detection.
A kind of error named false-alarm probability (no watermark embedded but detected as having one) is possible in the detector. For an unwatermarked image, the extracted bits are assumed to be independent random variables (Bernoulli trials) with the same success probability
Psuccess (It is called a “success” if the extracted bit matches
the embedded watermark bit). We assume the success probability Psuccess = 0.5. Let r be the number of “success” bits
in each LCR. An LCR is claimed watermarked if the number
of its “success” bits is greater than a threshold. The threshold for an LCR is denoted as T . Therefore, the false-alarm
error probability of an LCR is the cumulative probability
of the cases that r ≥ T .
Pf
Fig. 1
–
M̃ (x̃i , ỹi )
+ 0.5 %2 = 1
M̃ (ỹi , −x̃i ) · Q
»
–
M̃ (x̃i , ỹi )
+ 0.5 %2 = 0
M̃ (ỹi , −x̃i ) · Q
!
(Pf
i
disk )
· (1 − Pf
M −i
disk )
·
M
i
(11)
where M is the total number of disks in an image (based
on our experience, M = 10). Given Pf image , T can be
computed in terms of the value of Pf image .
431
X. Y. Wang and J. Wu/ A Feature-based Robust Digital Image Watermarking Against Desynchronization Attacks
4.1
Simulation results
We test the proposed watermarking scheme on the popular test images 512 × 512 Lena, Mandrill, and Pepper. A
bipolar sequence of size 32-bits is used as the watermark. Q
is set to 0.6, τ is set to 11, and the false-alarm probability
Pf image ≈ 5 E-4 when the detection threshold T is set to
24. Besides, the peak signal-to-noise ratio (PSNR) is used
to measure the visual quality of the watermarked images.
Finally, experimental results are compared with those of the
scheme in [8].
Fig. 2 (a), (b), (c), and (d) show the host image, watermarked image, the difference image between them and the
detection result, respectively.
The number of the watermarked LCR is 6 as shown in
Fig. 2 (c). The number of the correctly detected watermarked LCRs identified by using “white point” is also 6 as
shown in Fig. 2 (d). Table 1 shows the transparency comparison results of two image watermarking schemes.
Table 1
PSNR between watermarked and original images (dB)
Image
Proposed scheme
Lena
55.66
Scheme in [8]
49.42
Mandrill
50.34
45.70
Pepper
50.03
56.60
Simulation results for the various attacks are given in
Table 2. They are compared with those of the scheme in
[8]. It is clear that the proposed scheme outperforms the
scheme in [8] under the most attacks in terms of the detection rates, which is defined as the ratio between the number
of correctly detected watermarked LCRs and the number of
original embedded watermarked LCRs.
(a)
(b)
(c)
5
(d)
Fig. 2 The host image and the watermarked image: (a) The
host image, (b) The watermarked image, (c) The difference
image between host image and watermarked image, (d) The
detection results from the watermarked image
Table 2
Conclusions
Base on the scale-space theory, a robust image watermarking scheme is designed to resist both common signal
processing and desynchronization attacks. There are several key elements in our scheme. For one thing, based on
scale-space theory, the extracted feature points are reliable
under various attacks. For another, an adaptive method
of the LCR construction based on the characteristic scale
is presented and the robustness against desynchronization
attacks, especially scaling distortion, is improved. The proposed scheme is computationally inexpensive and extracts
the watermark without the help from the original image,
which enlarges its applied scope.
Fraction of correctly detected watermark LCR under various attacks (detection rates)
Lena
Attacks
Mandrill
Pepper
Proposed
[8]
Proposed
[8]
Proposed
[8]
Median filter
3/6
1/8
7/12
2/11
4/8
1/4
Sharpening
3/6
4/8
6/12
4/11
5/8
3/4
Gaussian noise
2/6
5/8
4/12
6/11
4/8
3/4
70
4/6
7/8
9/12
10/11
7/8
3/4
50
4/6
5/8
8/12
7/11
6/8
3/4
30
2/6
2/8
8/12
4/11
4/8
0/4
JPEG compression
15
4/6
1/8
5/12
1/11
5/8
0/4
Rotation
30
3/6
1/8
4/12
2/11
4/8
0/4
50
2/6
0/8
4/12
0/11
2/8
0/4
Scaling
0.8
3/6
1/8
5/12
4/11
3/8
2/4
1.4
1/6
0/8
1/12
1/11
2/8
0/4
Translation −x − 10 and −y − 10
5/6
2/8
10/12
8/11
5/8
1/4
Removed 8 rows and 16 columns
5/6
1/8
7/12
2/22
6/8
0/4
Shearing 55%
4/6
1/8
6/12
2/11
6/8
0/4
RBA
3/6
4/8
7/12
5/11
6/8
1/4
Translation -x-10 and -y-10 + Rotation 5 + Scaling 0.9
2/6
0/8
5/12
2/11
5/8
0/4
432
International Journal of Automation and Computing 04(4), October 2007
References
[1] M. Barni, I. J. Cox, T. Kalker. Digital Watermarking. In
Proceedings of the 4th International Workshop on Digital
Watermarking, Lecture Notes in Computer Science, vol.
3710, Springer, pp. 15–19, 2005.
[2] V. Licks, R. Jordan. Geometric Attacks on Image Watermarking System. IEEE Multimedia, vol. 1, no. 3, pp. 68–78,
2005.
[3] J. O. Ruanaidh, T. Pun. Rotation Scale and Translation
Invariant Digital Image Watermarking. Signal Process, vol.
66, no. 3, pp. 303–317, 1998.
[4] P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, F.
Davoine. Digital Watermarking Robust to Geometric Distortions. IEEE Transactions on Image Processing, vol. 14,
no. 12, pp. 2140–2150, 2005.
[5] X. Kang, J. Huang, Y. Q. Shi, Y. Lin. A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression. IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp.
776–786, 2003.
[8] C. W. Tang, H. M. Hang, A Feature-based Robust Digital
Image Watermarking Scheme. IEEE Transactions on Signal
Processing, vol. 51, no. 4, pp. 950–958, 2003.
[9] K. Mikolajczyk, C. Schmid. Scale & Affine Invariant Interest Point Detectors. International Journal of Computer
Vision, vol. 60, no. 1, pp. 63–86, 2004.
Xiang-Yang Wang is a professor at
Liaoning Normal University, and a senior
member of China Computer Federation.
His research interests include multimedia
information processing and network information security.
[6] M. Kutter, S. K. Bhattacharjee, T. Ebrehimi. Toward Second Generation Watermarking Schemes. In Proceedings of
IEEE International Conference on Image Process, Kobe,
Japan, vol. 1, pp. 320–323, 1999.
Jun Wu received the B.Sc. degree in
computer science and information engineering from the North University for Minority,
China, in 2000. He is currently pursuing
the M.Sc. degree at the School of Computer
and Information Technique, Liaoning Normal University, Dalian, China. He has published about 10 refereed journal and confer-
[7] P. Bas, J. M. Chassery, B. Macq. Geometrically Invariant
Watermarking Using Feature Points. IEEE Transactions on
Signal Processing, vol. 11, no. 9, pp. 1014–1028, 2002.
ence papers.
His research interests include digital watermarking technique
and multimedia digital signal processing.