1273385.pdf

Watermarking of Video Data Using
Integer-to-Integer
Discrete Wavelet Transform
S.N. Merchant
Dept. of Electrical Engineering
Indian Institute of Technology
Powai, Mumbai - 400076.
[email protected]
ABSTRACT
This paper proposes a novel video watermarking
technique to embed a digital watermark in.video
data using integer-to-integer discrete wavelet
transform. The watermark is embedded in the
lowest frequency components of each frame. The
method exploits features of the human visual
system. The watermark can be extracted directly
from the decoded video without access to the
original video. Experimental results have
indicated that the method i s robust against mpeg
encoding and re-encoding. '[t is also perceived
that the method is effective against statistical
attacks.
1. INTRODUCTION
Digital watermarking is a process that embeds
data called a watermark, tag, or label in a
multimedia object such that the watermark san
be detected or extracted later to make an
assertion about the object. The object may be an
image or audio or video [I].
Watermarking is
closely related to the well-established fields of
cryptography and.. steganography yet it is
sufficiently different from both in a variety of
ways [2]. A good review of digital watermarking
applications may be found in [3]. Earlier
watermarking schemes were designed to embed
the copyright information into the spatial domain
of videos [4], [ 5 ] . However most of the current
watermarking
techniques
work
in the
transformed frequeicy domain. The most
commonly used transforms are Discrete Fourier
Transform (DFT) [6], Discrete Cosine Transform
A. Harchandani, S . Dua, H. Donde, 1. Sunesara
Dept. of I.T. Engineering
Thadomal Shahani Engineering College
Bandra (W), Mumbai - 400050.
v [email protected]
(DCT) [7], and Discrete Wavelet Transform
(DWT) [SI, PI.
In this paper, we present a watermarking
technique based on Integer-to-Integer DWT
(IIDWT). We embed the watermark in
luminance component of each frame of the
uncoded video using a user-supplied key. The
watermark can be later extracted from the
luminance component of the decoded video
frame using the same key.
This paper is organized as follows. A brief
background about discrete wavelet Transform is
given in section 2. Integer Wavelets [IO] are
discussed in section 3. The' embedding and
extraction algorithms are explained -in detail in
section. 4, followed by experimental results in
section 5. Finally section 6 concludes the paper.
2. DISCRETE WAVELET
TRANSFORM
The DWT gives us three parts of multiresolution
representation (MRR) and one part of multiresolution approximation (MRA) [ I I]. It is
similar to hierarchical subtiand system, where the
subbands are logarith'niically spaced, in
frequency. The subbands labeled LH,, HL,, and
HH, of MRR represent the finest scale wavelet
coefficients. To obtain the next coarser scale of
wavelet coefficients, the subband LL, (that is
MRA) is further decomposed and critically
subsampled [9]. As an example, Fig. I shows an
image decomposed into ten subbands for three
scales.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 04:05 from IEEE Xplore. Restrictions apply.
JENCON 2003 / 940
Fig I. D W T Decomposition ofan image,
The wavelet transform has a number o f
advantages over other transforms:
e
It
provides
a
multiresolution
description.
I t allows superior modeling o f the
‘human visual system (HVS)[12].
The high-resolution subbands allow
easy detection o f features such as edges
or textured areas in transform domain.
3. INTEGER WAVELETS
In most cases, the f i l t e r s used during wavelet
transform have floating point coefficients. When
the input data consists o f integers (as i s the case
for luminance frames) the resulting filtered
outputs no longer consists o f integers. Yet for
lossless coding it would be of interest to be able
to characterize the output completely again with
integers. These modified wavelets, which
produce integer outputs, are termed as Integer
Wavelets [IO]. The two main approaches used to
produce integer-to-integer wavelet transforms
are expansion factors [I31 and lifting scheme
[14-15].
We have used the second approach during our
research to obtain an integer version of the
orthogonal Haar Transform. This transform i s
known as the S transform (Sequential).
4. ALGORITHMS
4.0. Introduction
We embed the watermark into Y component of
each frame using the IIDWT. The following
parameters will be used while explaining the
embedding and extraction algorithms:
1. L e t Fi be the i-th Y frame in the original
video with the size o f width x height, where
0 5 i < n a d n i s the total number o f frames.
2. L e t W=[wk] be the P multi-level data (Slevel), i.e. wk = O , I:.. S-l and k = I,2, ...P.
3. L e t N be the scale o f decomposition and the
decomposed elements be LL,(x,y), LH, (x.
y), HL. (x.y) where I 5 n 5 N, I 5 x 5
widthiz”, I 5 y 5 heightI2’.
4. L e t K be the user specified key that acts as a
seed to produce the pair o f secondary keys
(Kif, K,J where 0 5 i < n.
5. Let Q denote the robustness factor
6. 7 denotes the threshold value used to select
coefficients during embedding.
7. I I C j 1 I denotes L’ norm of coefficient C, that
i s considered a 1 x 1 vector.
8. T I and T2 are threshold values such that
TZ<<TI.
4.1. Embedding Algorithm:
The steps in the embedding algorithm are as
follows:
1. Accept the key K from the user and generate
a pair o f keys (Kif, KJ for each of the n
frames.
F o r i = 0 to n-l do the following:
2. Randomize the frame Fi depending upon the
value of the key K,r.This step i s performed
to improve rohustness against collusion
attacks.
3. Apply I I D W T to each frame to obtain the
transformed frame.
4. Calculate R as the number o f coefficients in
the MRA (LL,).
F o r k = l , 2 ...Pdothefollowing:
5. Generate a random number r between 0 and
R using key K,. as seed.
6. Calculate E as sum of norms o f coefficients
C, of HLNand LHN.
7. If E 2 T I then go to step 8.
IfT I > E 2 T multiply coefficients C, o f
HLNand LHNby a factor greater than I and
go to step 8.
If T > E 2 T2 multiply coefficients C, of
HLNand LHNby a factor less than I and go
to step 5.
If E < T2 go to step 5.
This step prevents the watermark data from
being embedded in low frequency regions.
This is because according to the HVS, high
frequencies are less visible than low
frequencies [ 161.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 04:05 from IEEE Xplore. Restrictions apply.
Digital Watermarking 1941
8. Calculate q, = C, / Q and select the integer
q,' such that it is a multiple of S closest to q,
9. Add value of wk to q,'.
IO. Now recalculate the coefficient C,using q,'.
I I . Finally, use inverse llDWT to obtain the
watermarked frame E,',
4.2 Extraction Algorithm
The steps.in the extraction algorithm are as
follows:
1 . Accept the key K from the user and generate
a pair of keys (K,f, K,J for each of the n
frames.
For i = 0 to n-I do the following:
2. Randomize the frame F, depending upon the
value of the key K,t. This step is performed
to improve robustness against collusion
attacks.
3. Apply IIDWT to each frame to obtain the
transformed frame.
4. Calculate R as the number of coefficients in
the MRA (LL,).
.
Fork = 1,2 ...P do the steps 5 to 7:
5. Generate a random number r between 0 and
R using key K,, as seed.
6 . If E 2 T go to step 7 else go to step 5.
7. Calculate qG= C, / Q and extract wk :
wk = q, mod S.
8. The individual watermarks extracted from
each frame are then compared and the value wk,
which occurs maximum number of times, is
stored at position k in the averaged watermark
W,,
Fig. 2. Original Frame (top left) and its Y
component (bottom lei?); Corresponding
Watermarked Frame (top right) and its Y
component (bottom right)
The watermarked frames shown above were
obtained using P = 32, N=3,T=I00,S=2 and Q =
2. Figure 3 shows the relationship between
length of the binary watermark P and PSNR [ 171
where Q = 2 and PSNR denotes average PSNR
of 30 frames. Table 1 shows the Bit Error Rate
(BER) of the embedded data (watermark) versus
the Length ofthe watermark (P) after performing
MPEG encoding once and Table 2 shows the
same for two MPEG encoding iterations. The
frames are encoded and decoded using an mpeg
codec provided by MPEG Software Simulation
Group (MSSG) [IS]. The BER for each frame is
simply the number of error bits divided by the
length of watermark. An identical watermark is
embedded in each frame. As can be seen from
the table, the watermark is quite robust to MF'EG
encoding and BER increases if MPEG reencoding is performed.
5. EXPERIMENTAL RESULTS
We have done extensive simulation to prove that
the proposed technique is effective under
different conditions. We evaluated the algorithm
using 30 frames of the "flower" mpeg video file,
Each luminance frame is of size 352 x 240 as
shown in fig. 2. As mentioned earlier, we have
used the S Transform during our experiments.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 04:05 from IEEE Xplore. Restrictions apply.
JENCON 2003 / 942
Table 1 . BER versus P after performing MPEG
encoding once for the proposed as well as the
technique presented in [9].
Length of
watermark
P
2
4
6
14
16
6. CONCLUSION
18
20
22
24
26
28
30
32
34
36
38
40
The proposed method is successfully able to
extract the waterinirk from each frame without
using the original video. The averaged
watermark W,,, obtained i s exactly the same as
the embedded original watermark. Besides, the
embedding of data in only those coefficients
whose norm is greater t h m specified threshold
makes the embedded watermark perceptually
invisible and robust against MPEG encoding and
re-encoding. The randomization of frames prior
to embedding of the watennark increases the
robustness of the watermark towards collusion
and other statistical attacks.
-
In the future, we would like to improve the
proposed method by considering the following
points:
Table 2. BER versus P after performing MPEG
encoding twice for the proposed as well as the
technique presented in [9].
I
Lengthof
watermark
P
I
Proposed
Technique
BER I BER
fur all
frames
I
I
I
I I
Technique using
DWT
BER I RER
for all fur W,
frames
~~
I
~~
I
I
According to [I91 the filters most suitable
for watermarking using wavelets are Villa,
Antonini and Brislawn. We are working on
using integer versions of these wavelets to
improve the BER.'
2. Using the concept ortemporal watermarking
can make another improvement. In this case
the third dimension i.e. time is also taken
into' consideration.
3. This technique can be used for real time
applications by extending it to the
compressed domain.
I.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 04:05 from IEEE Xplore. Restrictions apply.
Digital Watermarking/ 943
REFERENCES:
[I]Saraju P. Mohanty, “Watermarking ofDigital
Images.” A Master Degree’s Project Report,
Dept. o f EE, Indian Institute of Science,
Bangalore - 560 012, India, Ian. 1999.
[I21 Ross Martin and Douglas Cochran,
“Generalized wavelet transforms and the cortex
transform,” in Proc. ofthe 28”’Asilomar Conf
on Signals, Systems. & Computers, Nov. 1994.
[2] N. Johnson and S. Jajodia, “Exploring
steganography: seeing the unseen,” IEEE
Computer, Feb. 98, p.26.
[I31 R.Laroia, S.A.Tretter, and N.Farvardin, “A
simple and effective precoding scheme for noise
whitening on intersymbol interference channels,”
IEEE Trans. Commun.,41:460-463, 1993.
(31 fngemar.J.Cox. Matt L. Miller and Jeffrey A.
Bloom, “Watermarking Applications and their
Properties,” in Proc. lnt ‘I Conf On Information
Technologv, 2000.
[I41 W. Sweldens,”The lifting scheme: A
custom-design construction o f biorthogonal
wavelets,” Appl. Camput. Harmon. Anal. , 3 ( 2 ) :
186-200,1996,
[4] F. Hartung and B. Girod, “Watermarking of
uncompressed and compressed video,” Signal
Processing, vol. 66, no. 3,pp. 283-301,May
1998.
[ 151 W. Sweldens ‘‘ The lifting scheme: A
construction o f second generation wavelets,”
SIAMJ Math. A n d 1997.
[SIBijan G. Mobasseri, “Exploring CDMA for
watermarking o f digital video,” in Proceedings
oftheSPlE, vol. 3657, pp. 96-102, January
1999.
[ h ] F. Deguillamue, G. Csurka, J. Ruanaidh, and
T. Pun, “Robust 3D DFT video watermarking,”
in Proceedings ofthe SPIE, vol. 3657, pp. 113124, January, 1999.
[7] E. Koch. and J. Zhao. “Towards Robust and
Hidden Image Copyright Labeling,” JEEE
Workshop. pp. 20-22, 1995.
[XI
Mitchell D. Swanson, Bin Zhu, and Ahmed
T. ‘Tewfik, “Multiresolution scene-based video
watermarking using perceptual models,” IEEEJ.
on Se/, Areas in Comm., vol. 16, no. 4, pp. 540550, May 1998.
[I61 Martin Kutter,” Digital Image
Watermarking: Hiding Information in Images,”
PhD hesis, EFPL, Lausanne, Switzerland, 1999.
[I71 M. Kutter and F. A. P. Petitcolas, “A fair
benchmark for image watermarking systems,” in
citeseer. nj. nec.com/article/kult~r99fuir.html.
pages 226- 239.
[I81 MPEG Soffware Simulation Group,
http://wivw mpeg.org/MSSG/
[I91 Martin Dietze and Sabah Jassh, “The
Choice o f Filter Banks for Wavelet-based Robust
Digital Watermarking,” in Proc. ofthe
Multimedia and Security Workhop a1 ACM
Mullimedia. Juan-les-Pins. France. Dec 2002.
191 Hisashi Inoue, Akio Miyazaki, Takashi
Araki, and Takashi Katsura, “A Digital
Watermark Method Using the Wavelet
Transform for Video Data,” IEICE Trans.
F~mdamentals,vol. E83-A, no.1, January 2000.
[IO] A. R. Calderbaiik, 1. Daubechies, W.
Sweldens, and B.-L. Yeo, “Wavelet Transforms
that Map Integers to Integers,” Applied and
ComprrtationalHarmonic Analysis, vol. 5 , no. 3,
pp. 332-369, July 1998.
[II ] S.G.Mallat, “A theory for multiresolution
decomposition: The Wavelet Representation,”
IEEE Trans. Pattern Anal. R. Mach. Intell.,
voI.1 I, no.7, pp.674-693, 1989.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on December 3, 2008 at 04:05 from IEEE Xplore. Restrictions apply.