GB2374996A - Watermarking with predistortion - Google Patents

Watermarking with predistortion Download PDF

Info

Publication number
GB2374996A
GB2374996A GB0110151A GB0110151A GB2374996A GB 2374996 A GB2374996 A GB 2374996A GB 0110151 A GB0110151 A GB 0110151A GB 0110151 A GB0110151 A GB 0110151A GB 2374996 A GB2374996 A GB 2374996A
Authority
GB
United Kingdom
Prior art keywords
values
image
coefficients
watermark
array
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0110151A
Other versions
GB0110151D0 (en
Inventor
David Roger Bull
Cedric Nishan Canagarajah
Dominic Winne
Henry David Knowles
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Bristol
Original Assignee
University of Bristol
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Bristol filed Critical University of Bristol
Priority to GB0110151A priority Critical patent/GB2374996A/en
Publication of GB0110151D0 publication Critical patent/GB0110151D0/en
Priority to PCT/GB2002/001845 priority patent/WO2002089056A1/en
Publication of GB2374996A publication Critical patent/GB2374996A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0042Fragile watermarking, e.g. so as to detect tampering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/3216Transform domain methods using Fourier transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32165Transform domain methods using cosine transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32176Transform domain methods using Walsh, Hadamard or Walsh-Hadamard transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32187Transform domain methods with selective or adaptive application of the additional information, e.g. in selected frequency coefficients
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32277Compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32331Fragile embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/48Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using compressed domain processing techniques other than decoding, e.g. modification of transform coefficients, variable length coding [VLC] data or run-length data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Abstract

A scheme for inserting and extracting an invisible fragile watermark in an image/video sequence, in order to verify whether a watermarked image has been tampered with. According to one aspect of the invention, there is provided a method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients with first, second and third values; and for each array determining a binary value as a watermark component bit; determining a quantization parameter, based on the separation between the first and second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameter; and modifying the third value, such that it takes the closest one of the selected values which represents the determined watermark component bit. According to another aspect of the present invention, there is provided a method of extracting a watermark embedded in that way.

Description

<Desc/Clms Page number 1>
WATERMARKING WITH PREDISTORTION This invention relates to watermarking, and in particular to a system for embedding and extracting a fragile watermark in a digital object, such as a digital image.
More specifically, the invention relates to techniques for inserting and extracting fragile watermarks in an image, for the purposes of image authentication, allowing a user to determine whether and how a watermarked image has been tampered with.
A watermark is a visible or invisible structure in an image, which can be recovered after it has been embedded. A digital watermark is a digital pattern inserted into a digital creation, such as a digital image. The process of inserting a watermark into a digital image (embedding procedure) can be done directly in the spatial or transformed domain. The watermark can be inserted by altering certain coefficients in a way which minimises the resulting distortion of the image. The imperceptibility of the watermark is the first line of defence, since, if an image is not visibly watermarked, it is more difficult to avoid the watermark, by tampering with the image undetectably.
Most watermarking techniques fall into one of two main categories, namely the robust type, for copyright protection, and the fragile type, for authentication applications.
Robust watermarks must be embedded in the image so that it is virtually impossible, or at least difficult, to remove the watermark without visibly damaging the image. Such a watermark must be resistant to several image-processing techniques, such as cropping, scaling, filtering, compression/decompression, etc.
Fragile watermarks are designed to detect any unauthorised alteration of the image signal. Fragile
<Desc/Clms Page number 2>
watermarks may be used, for example, in connection with images generated by digital cameras to provide a basis for determining whether or not an image has been tampered with after its creation. The requirements of a fragile watermarking system change, depending on the data type and application.
An effective authentication scheme should have some or all of the following desirable features: to be able to determine whether an image has been altered or not, and to be able to locate any alteration made on the image, even without having the original image data; to be able to integrate the authentication data with host image data, rather than as a separate data file; the embedded authentication data should be invisible under normal viewing conditions; to be able to extract information concerning the method of attack; to be able to restore the attacked area in the watermarked image.
US-6,064, 764 proposes a fragile digital watermark embedding and extraction system where the insertion process is accomplished by embedding the bits of a digital signature of a hash function of the image in the frequency coefficients of the image. This procedure results in an imperceptible watermark, but the properties of hash functions prevent the localisation or quality assessment of the changes that have been made to the image.
EP-A2-0953938 describes an invisible digital watermark insertion technique for ownership verification and/or authentication purposes. The watermark is a combination of a given watermark bitmap and the hashed image. The extreme localisation is accomplished by embedding the digital signature in the
<Desc/Clms Page number 3>
Least Significant Bit (LSB) band of the image.
However, the method cannot distinguish malicious changes from innocent image processing operations.
The paper"Digital watermarking using multiresolution wavelet decomposition", Deepa Kundur and Dimitrios Hatzinakos, Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, Washington, May 1998, vol. 5, pp 2969-2972, discloses a robust watermarking technique.
The present invention seeks to provide a scheme for inserting and extracting an invisible fragile watermark in an image/video sequence, in order to verify whether a watermarked image has been tampered with.
According to one aspect of the invention, there is provided a method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients with first, second and third values; and for each array: determining a binary value as a watermark component bit; determining a quantization parameter, based on the separation between the first and second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameter; and modifying the third value, such that it takes the closest one of the selected values which represents the determined watermark component bit.
<Desc/Clms Page number 4>
The use of a quantization parameter, which is based on the separation between the first and second values as defined above, has the advantage that the watermark can be made fragile, while minimizing the amount of distortion which is introduced.
The first and second values are preferably the extreme values of the values of the coefficients.
According to a second aspect of the present invention, there is provided a method of extracting a watermark embedded in that way.
According to a third aspect of the present invention, there is provided method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients having two extreme values, and at least one inner value; and for each array: determining a binary value as a watermark component bit; predistorting at least one of the extreme values of the image coefficients, if necessary, to ensure a minimum separation between the extreme values; selecting a plurality of values between the extreme values to represent ones and zeros; and modifying the inner value, or at least one of the inner values, of the array, such that it takes the closest one of the selected values which represents the determined watermark component bit.
The use of the predistortion step, defined above, has the advantage that the watermarking performance is improved in plain low image density areas of the image.
<Desc/Clms Page number 5>
For a better understanding of the invention, and to show how it may be put into effect, reference will now be made to the accompanying drawings.
Figure 1 is a flow chart illustrating a method of embedding a watermark, in accordance with the invention.
Figure 2 illustrates a quantization process used as part of the method of Figure 1.
Figure 3 illustrates a predistortion procedure used as part of the method of Figure 1.
Figure 4 is a flow chart illustrating a method of extracting a watermark, in accordance with the invention.
Firstly, Figure 1 illustrates an embodiment of the invention in which a watermark is embedded in an image.
The algorithm described herein is a modification of an existing robust watermarking scheme of Kundur and Hatzinakos.
In step 101, the procedure starts with a set of image data. The image data may be in any form. For example, the image data may be a set of luminance and chrominance values associated with respective pixels of an image. The embedding of the watermark is advantageously carried out close to the source of the image. For example, the watermarking procedure can be carried out within a digital camera, for example.
The method of embedding the watermark into a digital image signal can be carried out in the spatial or transformed domain, depending on the application.
Thus, step 102 shows a transformation procedure. The transformation may be of any type, and may for example involve performing a digital cosine transform (DCT), a Fourier transform, a DFT, DST, Walsh, Hadamard, Hartley, or wavelet transform. Thus, when referring
<Desc/Clms Page number 6>
herein to coefficients, these can represent pixel values for a greyscale or coloured image, or DCT, wavelet or any transformed coefficients of the digital signal.
Next, in step 103, the coefficients of the image are divided into blocks. After watermarking, each block will contain a string of binary watermark values, and the block size represents the detection resolution.
The smaller the block size, the finer the detection resolution.
In step 104, several arrays are generated inside each block. The total number of arrays in each block will determine the number of watermark bits which can be embedded in each block. Each array contains three of the coefficients of the block, the coefficients forming each array depending on a secret key. Thus, the secret key acts as a seed number for a random number generator. The random number which is generated then controls the way in which the arrays of coefficients are formed.
The random number also provides a secret key which is used in the same way in the next block, and so on.
This means that the watermark is effectively embedded in different blocks in different ways. This provides a defence against an attempt to tamper with an image by forming a collage of blocks from different images or from different parts of the same image.
The initial key, which governs the creation of the secret keys used in the respective blocks, is stored in the device in which the watermark is embedded, such that it can be retrieved only by an authorised person.
In step 105, the watermark bit string is embedded in the selected block by modifying the values of the coefficients in each array, according to an algorithm to be described below. In steps 106 and 107, the watermarked image is obtained, by replacing the
<Desc/Clms Page number 7>
modified coefficients in their original position and then by calculating the inverse of any transform performed in step 102.
The basis of the algorithm which is used is described in the paper :"Digital watermarking using multiresolution wavelet decomposition", by Kundur and Hatzinakos, cited above. Their technique is used for robust watermarking.
The basis of the algorithm used herein is that the available image data coefficients are divided into arrays, each array preferably comprising three coefficients, namely the smallest coefficient, fs, the middle coefficient, fm, and the largest coefficient, fl.
The range between the smallest coefficient, fs, and the largest coefficient, fl, is divided into a number of equally sized bins, and the value of the middle coefficient, fm, is modified, based on a relationship between the bins and the watermark bit which is to be embedded.
In accordance with the preferred embodiment of the present invention, the bin width 5 is calculated from the values of the smallest coefficient, fs and the largest coefficient, fl, according to the following formula: 6 = (f,-fs)/Q, where Q is a variable that defines the number of bins between fl and fs.
By contrast with the prior art robust watermarking system, in the illustrated embodiment of the present invention, the value of Q is determined by the difference value (fl-fj.
Figure 2 illustrates the way in which the gap between the smallest and largest coefficient values is divided into bins. After sorting the three coefficients of the array into ascending order, the gap between them is divided into a number, Q, of bins, each
<Desc/Clms Page number 8>
of width 5. The value which is 0/4 from the left-hand end of each bin is then assigned to the value 0, as indicated by the dashed lines in Figure 2, while the value which is 30/4 from the left-hand end (i. e. 5/4 from the right-hand end) of each bin is assigned to the value 1, as indicated by the solid lines in Figure 2.
Then, depending on whether the watermark bit for that array is a 0 or a 1, the value of the middle coefficient fm is modified to the closest value assigned to that bit value, that is, the closest dashed or solid line in Figure 2.
As a result, the maximum amount of distortion which can be introduced by this modification is 0/2.
As mentioned above, the value of Q, the number of bins, is a content dependent quantization parameter.
The user sets a maximum permitted modification of fm, and the value of Q is set to an integer number determined by this maximum permitted modification and by the difference between fl and fa.
For example, if the maximum permitted modification is set to be 10, and the difference between fl and fs is 100, then a value of Q=5 will be chosen, since, then: 10 = 5/2 = (100/5)/2.
The value of the quantization parameter, Q, will be increased to 6 if the difference between fl and fs is higher than 100.
Using a content dependent quantization parameter has the effect that, when the image data allows it, a larger value of Q, and a correspondingly smaller value of 5, can be used. This increases the fragility of the watermarking scheme, and hence its ability to detect tampering with the image, while minimizing the distortion introduced by the watermarking system.
It will be noted that this watermarking process uses three coefficients to embed one watermarking bit (although arrays can include more than three
<Desc/Clms Page number 9>
coefficients if desired). This allows a watermark of 21 bits to be embedded in an 8x8 block of 64 coefficients.
Thus, the watermark is embedded in the image itself rather than appended, and thus provides a more flexible and convenient tool for subsequently investigating the image integrity.
In the example described above, the range between the smallest coefficient and the largest coefficient is divided into bins, and the middle coefficient is modified. However, it is also possible to divide the range between the middle coefficient and one of the two outer coefficients into bins, and then to extend bins of the same size so that they include the other outer coefficient, and then to modify that other outer coefficient in the same way as described above.
When embedding a watermark in the wavelet transform domain, the array can be generated from the three different detail coefficients at a given position (m, n). For example, the array of three coefficients is combined from the HL, HH and LH coefficients.
The secret key, described earlier, determines how the coefficients are grouped to form the arrays of three coefficients. In some cases, some coefficients can be used several times in different arrays. If any coefficients are to be used more than once, it is preferable that these should be very large or small coefficients, since it is only the median value coefficients that are modified.
Also, the same watermark bit could be applied to more than one array, and detected separately in each array. This technique could advantageously improve the robustness of the watermark to white Gaussian noise attack.
The watermark embedding process can be carried out by a general purpose computer, operating under the
<Desc/Clms Page number 10>
control of suitable software, or by another hardware device, such as a DSP or an ASIC, or other integrated circuit.
Figure 3 illustrates a further modification to the prior art robust watermarking scheme, in order to improve its performance in plain low image density areas, which are often difficult to watermark. By predistorting these areas, the algorithm introduces some high frequency noise in the more or less constant wavelet coefficients. This is generally unnoticeable, not least because the original image is not available to compare with the watermarked image, and the introduced high frequency noise is spread over the whole of the plain area. This predistortion function ensures a user defined minimum difference between fl and fs, before embedding the binary watermark value.
Thus, the process of Figure 3 can be carried out as an initial part of step 105 of Figure 1.
The predistortion procedure starts at step 301, and, in step 302 a counter i is initialised and a user defined minimum difference value, min~diff, is set, in this case to an exemplary value of 10.
In step 303, it is determined whether a predistortion is necessary, that is, whether the difference between fl and fs is less than the user defined minimum difference value. If it is not, no predistortion is necessary, and the process ends (step 304).
If it is determined that predistortion is required, this is calculated in a loop of steps 305 and 306, and then, in step 307, the largest coefficient, fl,
is increased by an amount sufficient to make fl equal to fa plus the preset minimum difference value. For instance, if the difference between fl and fs is 6 then the value of fi is increased by 4 to achieve the minimum difference of 10.
<Desc/Clms Page number 11>
- - The predistortion procedure then ends, and the process returns to step 105 in the watermarking procedure.
Figure 4 illustrates the watermarking extraction procedure, as carried out in a detector. For example, the detection procedure can be performed in a suitably programmed device.
The procedure starts at step 401, and, in step 402, calculates the coefficients of the image with the necessary transform and initialises a counter value i.
In step 403, if several arrays contained one watermark bit to improve the robustness of the watermark as described earlier, the coefficients are divided in blocks. The detected watermark bit can then be obtained from a weighted estimation of the results obtained from different arrays, as described in more detail below.
In step 404, the arrays containing the three coefficients are formed. This is controlled by a secret key function, which uniquely creates the correct arrays, using the same secret key used in the watermark embedding process. Thus, it is necessary to retrieve the key that was used in the watermark insertion process, in order to be able to determine the grouping of the coefficient arrays, and in order to extract the embedded watermark.
Thus, the secret key function controls the security of the authentication process even if the embedding and extraction algorithms are publicly known.
The following steps apply to each array.
In step 405, the given array is sorted in ascending order and the quantization parameter Q is extracted from the difference between fl and fs. Then the bin size 6 is calculated using the formula given previously. Once fs and 0 are known, the detected watermark binary value can be extracted from the
<Desc/Clms Page number 12>
position of fm relative to fl and fg. Specifically: Steps 407 and 406 are looped by incrementing the counter i to locate the bin in which fm lies, namely the value of i which allows: fm E [fs + (i-1) 5, f, + i. 5] Then, by comparison of the relative position of fm inside that interval, we obtain the extracted watermark value.
Thus, as set out in steps 408,409 and 410 of Figure 4, if: fm- (fs + (i-1) 5) < (fs + i. 5)-f,, then W = 0, otherwise W = 1.
Thus, step 408 determines the relative position of fm and pinpoints the extracted binary value for this array.
This extraction process is repeated for all of the arrays of three coefficients, until all of the embedded bits have been extracted. The extracted bits then represent the extracted watermark, unless the arrays were grouped together to carry the same bit.
If multiple arrays carry the same bit, a weighted decision determines the extracted watermark bit value.
In that case, the process for extraction of the watermark bit is as described above, except that, instead of the thresholding step 408, a value v (where 0 v 1) is determined, based on the position of fm, relative to the nearest value which is assigned to the value 0 and the nearest value which is assigned to the value 1.
For example, if the determined position of fm is equidistant between the nearest value which is assigned to the value 0 and the nearest value which is assigned to the value 1, then a value v of 0. 5 is determined.
To illustrate the result of this process, if a watermark bit was embedded in three arrays, and the three coefficients extracted from these arrays give
<Desc/Clms Page number 13>
values of v, based on their relative positions as described above, of: 0.6, 0.6 and 0.1, then a weighted decision results in an extracted value of 0. Thus: round ( (0. 6+0.6+0. 1)/3)-0.
By contrast, following the process as shown exactly in Figure 4, and then taking the average of the extracted (separately rounded) bits is a 1 :- round (0. 6)-1 round (O. 6) 1 round (0. 1) - 0 average = 1.
After the extraction process, the extracted watermark bit values can be compared with the originally embedded watermark. This comparison locates any tampered area, if the extracted bit does not match the embedded bit on the given position.
The location of the array which includes the nonmatching bit indicates the tampered region of the image. Since it is advantageous to be able to locate the illegally tampered area precisely, the detection resolution should preferably be as high as possible.
The watermark can be embedded in the secret key information or standard built in the detector, as the watermark is not the most important factor of the detector.
The watermark extraction and comparison process can be carried out by a general purpose computer, operating under the control of suitable software, or by another hardware device, such as a DSP or an ASIC, or other integrated circuit.
The correct formation of the arrays of coefficients plays an important role in the detection process.
If a watermarked image is resized or cropped, then the extraction procedure will also return an output
<Desc/Clms Page number 14>
that indicates that the whole image was changed. This would result in a random detector output if the watermarked image is resized or cropped.
For colour images, the watermark can be embedded in every plane or just a specific plane.
In the case of a video sequence, each frame or just some selected frames, e. g.: I-frames, can be watermarked, depending on the application and the ability to detect attacks which involve frame reordering and frame removal.
This fragile watermarking scheme can be used in combination with a robust watermark algorithm to form a hybrid watermark system. The hybrid watermark can then be used to pinpoint changes accurately, as well as to distinguish malicious tampering from innocent operations.

Claims (26)

1. A method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients with first, second and third values; and for each array: determining a binary value as a watermark component bit; determining a quantization parameter, based on the separation between the first and second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameter; and modifying the third value, such that it takes the closest one of the selected values which represents the determined watermark component bit.
2. A method as claimed in claim 1, wherein the quantization parameter is determined on the basis of a preset maximum separation of the selected values.
3. A method as claimed in claim 2, wherein the preset maximum separation of the selected values is user selectable.
4. A method as claimed in claim 1,2 or 3, wherein the first and second values are the smallest and the largest values of coefficients in the array.
5. A method as claimed in any preceding claim, wherein the image coefficients comprise transform coefficients.
6. A method as claimed in any preceding claim, wherein the image coefficients comprise bit values.
<Desc/Clms Page number 16>
7. A computer system, programmed to carry out a method as claimed in any one of claims 1 to 6.
8. A hardware device, adapted to carry out a method as claimed in any one of claims 1 to 6.
9. An image generation device, comprising: means for generating a digital image; and means for carrying out a method as claimed in any one of claims 1 to 6.
10. A computer software product, containing code for carrying out a method as claimed in any one of claims 1 to 6.
11. A method of detecting a watermark in a digital image, the method comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients having first, second and third values; and for each array: determining a binary value as an actual watermark component bit; determining a quantization parameter, based on the separation between the first and second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameter; and determining which of the selected values is closest to the third value; determining a detected watermark component bit, based on whether the closest one of the selected values to the third value represents a one or a zero; and comparing the detected watermark component bit and
<Desc/Clms Page number 17>
the actual watermark component bit.
12. A method as claimed in claim 11, further comprising: displaying said digital image, distinguishing between regions of the image in which the detected watermark component bit matches the actual watermark component bit, and regions of the image in which the detected watermark component bit does not match the actual watermark component bit.
13. A method as claimed in claim 11 or 12, wherein the digital image is a frame of a video sequence.
14. A computer system, programmed to carry out a method as claimed in any one of claims 11 to 12.
15. A hardware device, adapted to carry out a method as claimed in any one of claims 11 to 12.
16. A computer software product, containing code for carrying out a method as claimed in any one of claims 11 to 12.
17. A method of watermarking a digital image, comprising : obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients having two extreme values, and at least one inner value; and for each array: determining a binary value as a watermark component bit; predistorting at least one of the extreme values of the image coefficients, if necessary, to ensure a minimum separation between the extreme values; selecting a plurality of values between the extreme values to represent ones and zeros; and
<Desc/Clms Page number 18>
modifying the inner value, or at least one of the inner values, of the array, such that it takes the closest one of the selected values which represents the determined watermark component bit.
18. A method as claimed in claim 17, wherein the number of selected values, and the separation between successive selected values, are determined on the basis of the separation between the extreme values, and on the basis of a preset maximum separation of the selected values.
19. A method as claimed in claim 18, wherein the preset maximum separation of the selected values is user selectable.
20. A method as claimed in claim 17,18 or 19, wherein each array comprises three image coefficients.
21. A method as claimed in any of claims 17-20, wherein the image coefficients comprise transform coefficients.
22. A method as claimed in any of claims 17-21, wherein the image coefficients comprise bit values.
23. A computer system, programmed to carry out a method as claimed in any one of claims 17 to 22.
24. A hardware device, adapted to carry out a method as claimed in any one of claims 17 to 22.
25. An image generation device, comprising: means for generating a digital image; and means for carrying out a method as claimed in any one of claims 17 to 22.
26. A computer software product, containing code for carrying out a method as claimed in any one of claims 17 to 22.
GB0110151A 2001-04-25 2001-04-25 Watermarking with predistortion Withdrawn GB2374996A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0110151A GB2374996A (en) 2001-04-25 2001-04-25 Watermarking with predistortion
PCT/GB2002/001845 WO2002089056A1 (en) 2001-04-25 2002-04-23 Watermarking with coefficient predistortion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0110151A GB2374996A (en) 2001-04-25 2001-04-25 Watermarking with predistortion

Publications (2)

Publication Number Publication Date
GB0110151D0 GB0110151D0 (en) 2001-06-20
GB2374996A true GB2374996A (en) 2002-10-30

Family

ID=9913444

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0110151A Withdrawn GB2374996A (en) 2001-04-25 2001-04-25 Watermarking with predistortion

Country Status (2)

Country Link
GB (1) GB2374996A (en)
WO (1) WO2002089056A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7376242B2 (en) 2001-03-22 2008-05-20 Digimarc Corporation Quantization-based data embedding in mapped data
US8050452B2 (en) 2001-03-22 2011-11-01 Digimarc Corporation Quantization-based data embedding in mapped data
AU2002357259A1 (en) 2001-12-13 2003-07-09 Digimarc Corporation Reversible watermarking
US8059815B2 (en) 2001-12-13 2011-11-15 Digimarc Corporation Transforming data files into logical storage units for auxiliary data through reversible watermarks
US7006662B2 (en) 2001-12-13 2006-02-28 Digimarc Corporation Reversible watermarking using expansion, rate control and iterative embedding
US7187780B2 (en) 2001-12-13 2007-03-06 Digimarc Corporation Image processing methods using reversible watermarking
US7515730B2 (en) 2001-12-13 2009-04-07 Digimarc Corporation Progressive image quality control using watermarking
US9349153B2 (en) 2007-04-25 2016-05-24 Digimarc Corporation Correcting image capture distortion
US10664940B2 (en) 2010-03-05 2020-05-26 Digimarc Corporation Signal encoding to reduce perceptibility of changes over time
US8971567B2 (en) 2010-03-05 2015-03-03 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US8477990B2 (en) 2010-03-05 2013-07-02 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
KR20130107539A (en) * 2012-03-22 2013-10-02 삼성전자주식회사 Method and apparatus for embedding and detecting watermark
CN117057971B (en) * 2023-10-07 2023-12-29 湖北微模式科技发展有限公司 JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1028585A1 (en) * 1999-01-21 2000-08-16 Nec Corporation A method for inserting and detecting electronic watermark data into a digital image and a device for the same
GB2348071A (en) * 1999-03-18 2000-09-20 British Broadcasting Corp Watermarking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6704431B1 (en) * 1998-09-04 2004-03-09 Nippon Telegraph And Telephone Corporation Method and apparatus for digital watermarking

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1028585A1 (en) * 1999-01-21 2000-08-16 Nec Corporation A method for inserting and detecting electronic watermark data into a digital image and a device for the same
GB2348071A (en) * 1999-03-18 2000-09-20 British Broadcasting Corp Watermarking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Dittmann et al. IEEE International Conference on Multimedia Computing and Systems.Page(s):209-213 V2 *

Also Published As

Publication number Publication date
GB0110151D0 (en) 2001-06-20
WO2002089056A1 (en) 2002-11-07
WO2002089056A8 (en) 2003-03-13

Similar Documents

Publication Publication Date Title
US6101602A (en) Digital watermarking by adding random, smooth patterns
Fridrich Methods for tamper detection in digital images
Lin et al. Detection of image alterations using semifragile watermarks
Fridrich Robust bit extraction from images
Voyatzis et al. Chaotic watermarks for embedding in the spatial digital image domain
AU701639B2 (en) Secure spread spectrum watermarking for multimedia data
Fridrich et al. Robust digital watermarking based on key-dependent basis functions
EP1552473A1 (en) Localisation of image tampering
GB2374996A (en) Watermarking with predistortion
Winne et al. Digital watermarking in wavelet domain with predistortion for authenticity verification and localization
Mobasseri et al. Content-dependent video authentication by self-watermarking in color space
Guo et al. Multi-resolution image watermarking scheme in the spectrum domain
JP6937012B2 (en) Digital watermarking device and method
Premaratne et al. 2D barcodes as watermarks in image authentication
GB2374995A (en) Watermarking using representative values
Roberts Security camera video authentication
Luo et al. JPEG domain watermarking
Soheili Redundant watermarking using wavelet packets
Kitanovski et al. Watermark generation using image-dependent key for image authentication
Rakhmawati et al. Review of some existing work for self-recovery fragile watermarking algorithms
Kasiran et al. Analysis On Digital Image Watermarking Using Dct-Dwt Techniques
Patel et al. A detailed Study of Digital Image Watermarking Techniques
Al-Mualla Content-adaptive semi-fragile watermarking for image authentication
Li et al. An adaptive secure watermarking scheme for images in spatial domain using fresnel transform
Sagetong et al. Dynamic wavelet feature-based watermarking for copyright tracking in digital movie distribution systems

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)