Blind Watermarking in Contourlet Domain with Improved Detection Jayalakshmi M., S . N. Merchant and U. B. Desai SPANN Lab, Electrical Department, Indian Institute of Technology, Bombay Powai, Mumbai-76, India email: Glakshmi, merchant, ubdesai) @ ee.iitb.ac. in Abstract This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects,further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions. 1. Introduction Digital watermarking has been proposed as a solution to illegal copying or reproduction of digital data. The applications like copyright protection and authentication may mostly require the content owner or the authorized buyer to prove the authenticity without reference to the cover work. This creates a demand on blind watermarking techniques over non-blind watermarking techniques. There are a few methods of watermarkingwhich do not use the original data for detecting or recovering the digital watermark embedded into the cover work [6], [7], [S]. Wavelet based algorithms have been chosen for watermarking since new image coding standards use wavelet domain representation and it models human visual systems well. But it has been proved that wavelets are good at representing discontinuities in one dimension only [3]. So, curvelet transform was defined to represent two dimensional discontinuities more efficiently, with least mean square error in a fixed term approximation [3]. But, curvelet transform was proposed in continuous domain and its dis- cretization was a challenge when critical sampling was desired. Contourlet transform was then proposed as an improvement on curvelet transform using a double filter bank structure. Contourlet transform provides a flexible multiresolution representation for two dimensional signals. It makes use of the Laplacian Pyramid [2] for the multiresolution decomposition of the image. After this, a directional decomposition is performed on every bandpass image using directional filter banks [I]. Contourlet transform is unique since the number of directionalbands could be specified by the user at any resolution. In our simulations, we have used a decomposition where the number of directional bands doubles at every decomposition level. In this paper, we propose a blind watermarking method, which embeds a watermark in the second decomposed level. We embed a pseudorandom sequence generated using a key, into the transformed coefficients in this band, with respect to the presence of 0 or 1 in the binary watermark chosen. The pseudorandom sequence is modulated, so that there is no visual distortion on the watermarked image. The robustness of the proposed algorithm is tested against various attacks including StirMark 3.1. For the purpose of comparison, we have simulated results with a wavelet based blind watermarking method also. The results of watermark retrieval prove that contourlet based method outperforms wavelet based method in case of signal processing operations like Gaussian noise addition, salt-pepper noise addition with median filtering, mean filtering, median filtering and JPEG compression. The paper is organized as follows. Section 2 describes the proposed algorithm. The simulation results of embedding and retrieval are given in Section 3. Conclusions are drawn in Section 4. 2. Proposed Algorithm Contourlet transform gives a multiresolution, local and directional expansion of images using Pyramidal Directional Filter Bank (PDFB)[S]. The PDFB combines Lapla- Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06) 0-7695-2745-0/06 $20.00 © 2006 Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 00:31 from IEEE Xplore. Restrictions apply. cian Pyramid which captures the point discontinuities,with a directional filter bank which links these discontinuities into linear structures. Laplacian Pyramid is a multiscale decomposition of the L2(R2)into series of increasing resolution subspaces which are orthogonal complements of each other as follows. An 1-level directional filter bank generates a local directional basis for Z2(Z2)that is composed of the impulse response of the directional filter banks and their shifts. In contourlet transform, the directional filter is applied to the detail subspace W j . This results in a decomposition of W j into 2'j subspaces at scale 29. 2.1. Watermark Embedding The watermark is embedded using spread spectrum technique using and additive rule [4]. A pseudorandom sequence is generated using a key, which is additively embedded into the transformed coefficients. We have selected a binary watermark which will be embedded into the second decomposed level using the spread spectrum method depending on whether a 0 or 1 occurs. Let Y(x,y)represent a pixel in band Y of the transformed image and Y i ( x ,g) represent the corresponding watermarked pixel. Let the pseudorandom sequence generated be P. Then, additive watermarking is performed as per the following equation. Y ' ( x , Y )= Y ( x , Y )+ c . ~ w k p ( ~ , < ~ x,Y ) , o < ( N / 2 )- 1 (3) Here W k represents each watermark bit. The multiplication factor cu is selected such that the watermarked image looks visually very similar to the original image. We calculate the Peak Signal to Noise Ratio (PSNR) of the watermarked image to assess its visual quality with respect to the original image. 2.2. Watermark Detection The embedded watermark is retrieved by a correlation detector. After receiving a possibly attacked image, we take the contourlet decomposition of the image. The pseudorandom sequence is generated using the secret key and the correlation of the watermarked pixel with this generated sequence is found out. Let y represent the watermarked pixels obtained after transformation. Then the correlation for deciding the ithbit is found out as follows. Figure 1. Contourlet decomposition As seen in Figure 1, we have used a directional decomposition which doubles at every level of multiresolution pyramid. If the original image is of size N x N , the second decomposed band would be of size ( N / 2 ) x ( N / 2 ) . We have watermarked all coefficients of band Y and 75% coefficients of band Y with a pseudorandom sequence. The latter was performed since the wavelet decomposed image in the second decomposed level will be of the same size. The security of the watermarking scheme could be improved by selecting any number of decomposition and choosing any particular band in the selected level for watermark hiding. The mean of the correlation values pi is calculated and is selected as a threshold T , for deciding the watermark bit. If the correlation is above the mean value of the correlation, i.e., pi > T , then we choose the watermark bit to be 1. Else, the watermark bit is 0. Thus, entire binary watermark is generated. There is no specific threshold defined for retrieving the logo correctly. We have seen from experiments that the visual quality of the retrieved logo was improved by performing a median filtering operation on it, especially those retrieved after some attacks. After getting this image, we verified the visual resemblance by comparing the correlation of approximate band or low frequency wavelet coefficient of this logo with that of the original logo. From experimentation we have observed that if the normalized cross correlation between the approximatebands of these logos is above 0.8, the visual quality of the retrieved mark was very good. So we have chosen 0.8 as the threshold for correct retrieval. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06) 0-7695-2745-0/06 $20.00 © 2006 Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 00:31 from IEEE Xplore. Restrictions apply. 3. Simulation Results Simulation results with 512 x 512 Lena image and 22 x 96 binary watermark are included here. As explained before, we have simulated three different cases of embeddingtwo in contourlet domain and one in wavelet domain. The (a) Logo (b) Watermarked image (c) With authorized key (d) After median filtering Figure 2. PSNR variation with a first method watermarks the entire band Y of size 256 x 256 and the second method watermarks 75% of band Y of size 256 x 384. We have chosen all bands in Y except Y7and Y8 for the second case. In the third method, the vertical, horizontal and diagonal detail bands of wavelet decomposed image in second decomposed level is chosen for watermark embedding. The variation of PSNR with multiplication factor a is shown in Figure 2 for all the three cases considered. The binary watermark selected is shown in Figure 3a. Watermarked image of Lena with a multiplication factor 0.225 and PSNR 40.84 dB is shown in Figure 3b. The retrieved watermark from this image is also shown in Figure 3c. This retrieved watermark is median filtered to get the logo given in Figure 3d. Figure 3e shows a retrieved logo with an unauthorized key. The variation of watermark retrieval with multiplication factor is shown in Figure 4 for the three cases considered. We can see from Figure 4 that contourlet gives better retrieval compared to wavelets under similar conditions of embedding. 3.1. Resilience to attacks Watermarking methods should be robust to common signal processing operations which could be intentional or unintentional. This section briefly gives the retrieval results of the proposed method against various signal processing operations. The results of retrieval from watermarked Lena image with PSNR of 40.84 corresponding to an embedding strength of 0.225 is included in the second and third columns of Table 1. The second column gives the correlation coefficient of the retrieved watermark with embedded (e) With unauthorized key Figure 3. Original and retrieved logos and watermarked image Figure 4. Correlation coefficients with a watermark denoted as 'coeffl'. The third column, denoted by 'coef%', shows the correlation coefficient between the low pass bands of the original logo and that of the noise removed logo. This correlation coefficient is found out to just decide a threshold for detection. A value above 0.8 in this column shows that the retrieved logo is visually similar to the original logo embedded. The fourth and fifth columns show the correlation coefficients from contourlet Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06) 0-7695-2745-0/06 $20.00 © 2006 Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 00:31 from IEEE Xplore. Restrictions apply. Table 1. Normalized correlation coefficients after various attacks Attack coeffl coet3-2 Contourlet Wavelet (0.225) (0.225) (0.275) (0.275) (a) Cropped image (c) From a (b) Cropped image (d) From b Figure 5. Cropped images and the retrieved watermarks based and wavelet based watermarking respectively, under similar embedding conditions. Both these columns select 98304 (256 x 384) pixels for embedding with multiplications factor 0.275. The robustness of the proposed method was tested against different signal processing operations like mean filtering, median filtering (2 x 2 and 3 x 3), Gaussian noise addition (variance 0.I), salt-pepper noise (variance 0.1) with median filter, JPEG compression, cropping etc. We have also tested the robustness against StirMark 3.1 and the proposed contourlet based blind method has shown good performance against many of the attacks as shown in Table 1. Figure 5 shows the cropped images of watermarked Lena with multiplication factor 0.2 and the retrieved watermarks from them. From Table 1 it is obvious that the contourlet algorithm works better in case of noise addition, mean filtering, median filtering and compression. The results with rotation and scaling are not included in this paper. Authors are currently working on the directional property of the contourlet coefficients which could be well exploited to get very good results of detection in case of attacks like rotation and rotation with scaling. 4. Conclusions In this paper, we propose contourlet domain blind watermarking for images for better robustness. Different factors like the secret key selected for embedding, the level of decomposition selected and the number of directional bands determine the security of the algorithm. The robustness of our algorithm is tested against various attacks and the results prove that the proposed algorithm is better than wavelet based method under similar embedding conditions. References [I] R. H. Bamberger and M. J. T. Smith. A filter bank for the directional decomposition of images: theory and design. IEEE Trans. on Signul Processing, 405382-893, Apr. 1992. [2] P. J. Burt and E. H. Adelson. The laplacian pyramid as acompact image codes. IEEE Trans. on Communications, 31532540, Apr. 1983. [3] E. J. Candes and D. L. Donoho. Curvelets- a surprisingly effective nonadaptive representation for objects with edges. Saint-Malo Proceedings, 1999. [4] I. Cox, J. Kilian, F. T. Leigton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 6:1673-1687, Dec. 1997. [5] M. N. Do and M. Vetterli. The contourlet transform: An efficient directional multiresolution image representation. IEEE Trans. on Image Processing, 14(12):2091-2106, Dec. 2005. [6] Y. Fang, J. Huang, and Y.Q. Shi. Image watermarking algorithm applying cdma. Int. Sym. on Circuits and Sys., 2:II948-11-95 1, May 2003. [7] S. P. Maity and M. K. Kundu. A blind cdma watermarking scheme in wavelet domain. IEEEInt. Conf Image Processing, pages 2633-2636, Oct. 2004. [8] P. H. W. Wong and 0 . C. Au. A blind watermarking technique in jpeg compressed domain. IEEE Int Con$ on Image Processing, pages 497-500, Sept. 2002. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06) 0-7695-2745-0/06 $20.00 © 2006 Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 00:31 from IEEE Xplore. Restrictions apply.
© Copyright 2025 Paperzz