The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors

Similar documents
Journal of mathematics and computer science 11 (2014),

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

THE advent of the digital age with the Internet revolution

Local prediction based reversible watermarking framework for digital videos

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

ROBUSTNESS OF A DFT BASED IMAGE WATERMARKING METHOD AGAINST AM HALFTONING

CoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

International Journal of Advancedd Research in Biology, Ecology, Science and Technology (IJARBEST)

Digital Watermarking Using Homogeneity in Image

Hologram-based watermarking capable of surviving print-scan process

An Integrated Image Steganography System. with Improved Image Quality

Data Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA

Blind Blur Estimation Using Low Rank Approximation of Cepstrum

Improved Detection of LSB Steganography in Grayscale Images

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

DEFOCUS BLUR PARAMETER ESTIMATION TECHNIQUE

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

An Enhanced Least Significant Bit Steganography Technique

Camera identification from sensor fingerprints: why noise matters

Content Based Image Retrieval Using Color Histogram

Digital Image Processing

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Midterm Examination CS 534: Computational Photography

Visual Secret Sharing Based Digital Image Watermarking

PRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB

4 STUDY OF DEBLURRING TECHNIQUES FOR RESTORED MOTION BLURRED IMAGES

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

fast blur removal for wearable QR code scanners

Dynamic Collage Steganography on Images

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Image Restoration using Modified Lucy Richardson Algorithm in the Presence of Gaussian and Motion Blur

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Analysis of Secure Text Embedding using Steganography

ON INFORMED CODING AND HOST REJECTION FOR COMMUNICATION OVER INKJET PRINT-AND-SCAN CHANNELS

UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS. Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik

DWT based high capacity audio watermarking

Image Processing for feature extraction

Watermarking patient data in encrypted medical images

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Introduction to Audio Watermarking Schemes

A New Image Steganography Depending On Reference & LSB

Robust Watermarking Scheme Using Phase Shift Keying Embedding

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

High capacity robust audio watermarking scheme based on DWT transform

Robust and Blind Spatial Watermarking in Digital Image

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Keywords Secret data, Host data, DWT, LSB substitution.

Digital Image Watermarking by Spread Spectrum method

Blind Image Fidelity Assessment Using the Histogram

Digital Watermarking for Forgery Detection in Printed Materials

Toward Non-stationary Blind Image Deblurring: Models and Techniques

Application of Histogram Examination for Image Steganography

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking

Table of contents. Vision industrielle 2002/2003. Local and semi-local smoothing. Linear noise filtering: example. Convolution: introduction

A Study on Image Steganography Approaches in Digital Images

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Last Lecture. photomatix.com

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Hiding Image in Image by Five Modulus Method for Image Steganography

Audio Watermark Detection Improvement by Using Noise Modelling

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Blind Dereverberation of Single-Channel Speech Signals Using an ICA-Based Generative Model

Image Enhancement in spatial domain. Digital Image Processing GW Chapter 3 from Section (pag 110) Part 2: Filtering in spatial domain

Scale estimation in two-band filter attacks on QIM watermarks

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Image Enhancement using Histogram Equalization and Spatial Filtering

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Non Linear Image Enhancement

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

NO-REFERENCE PERCEPTUAL QUALITY ASSESSMENT OF RINGING AND MOTION BLUR IMAGE BASED ON IMAGE COMPRESSION

Geometrically Invariant Digital Watermarking Using Robust Feature Detectors. Xiao-Chen Yuan. Doctor of Philosophy in Software Engineering

Data Hiding Using LSB with QR Code Data Pattern Image

A Study of Slanted-Edge MTF Stability and Repeatability

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Lossless Image Watermarking for HDR Images Using Tone Mapping

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

ECC419 IMAGE PROCESSING

REVERSIBLE data hiding, or lossless data hiding, hides

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Blind Single-Image Super Resolution Reconstruction with Defocus Blur

FPGA implementation of DWT for Audio Watermarking Application

Printed Document Watermarking Using Phase Modulation

Image Forgery Detection Using Svm Classifier

Image Restoration and Super- Resolution

Tan-Hsu Tan Dept. of Electrical Engineering National Taipei University of Technology Taipei, Taiwan (ROC)

Image Enhancement for Astronomical Scenes. Jacob Lucas The Boeing Company Brandoch Calef The Boeing Company Keith Knox Air Force Research Laboratory

Computing for Engineers in Python

DIGITAL IMAGE PROCESSING UNIT III

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

PRIOR IMAGE JPEG-COMPRESSION DETECTION

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Transcription:

acta graphica 194 udc 004.056.55:655.36 original scientific paper received: -09-011 accepted: 11-11-011 The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors Ante Poljičak, Lidija Mandić, Maja Strgar Kurečić University of Zagreb, Faculty of Graphic Arts, Croatia Abstract: In this paper is evaluated the effect of image enhancement filters on the watermark detection rate. State-of-the-art watermarking methods are still very sensitive to complex degradation attack such as print-scan process, so the detection rate of a watermark method decreases considerably after such an attack on a watermarked image. Therefore, to improve the detection rate, the degradation of the image is reduced by using image enhancement filters. A dataset of 1000 images was watermarked, printed and scanned for the experiment. Scanned images were enhanced by means of an unsharp filter and blind deconvolution filter. The watermark detection rate was measured and compared before and after the enhancement. The results show that the enhancement filtering improves the watermark detection rate by almost 10 %. Keywords: Image Watermarking, Unsharp Filter, Deconvolution, ps process, Watermark Detection Rate 1. Introduction With today s availability of digital information, as well as powerful media devices, there is a ubiquitous copyright infringement of digital images, which brings extensive loses to their rightful owners. To mitigate this problem, numerous image watermarking methods have been developed. These methods are only partially successful, and the interest of the research community for the problem of digital image protection has never been greater. There are many different ways to implement a watermark in an image. One of the most popular approaches is the implementation of watermark in the Fourier transform domain. This approach has two advantages in comparison to the spatial domain methods. First, it possesses strong robustness to geometric attacks, and second, it has a property to distribute the energy of the watermark over the entire image (Poljicak et al, 011). This enables the implementation of stronger watermarks with less perceptual impact. On the other 53

hand, according to Raja et al, fast Fourier transform (FFT) methods introduce round-off errors, which can result in the loss of quality and errors in watermark extraction (Raja et al, 011). However, other authors state that this disadvantage is much more important for hidden communication than for watermarking (Cheddad et al, 010). Due to their resistance to geometric attacks and the distribution of energy, FFT watermarking methods are developed to create robust watermarking schemes resistant to the degradation attacks of the watermarked image in the transmission channel, such as the Print-scan process (ps process). The robustness of the watermarking method to ps process would enable the use of the method in the protection of printed images, thus enabling the use of digital watermarks in the protection of analog media. However, the ps process is very difficult to model. It engenders a number of linear (translation, rotation and scaling) and non-linear attacks (pixel distortions and noise addition). These attacks are not only user and equipment dependent, but also time-variant (Solanki et al, 004). For this reason there are few watermarking methods robust to the ps process, all of which use the Fourier transform domain. Examples can be found in (He & Sun, 005) and (Kang et al, 010). There are also some multiple domain methods that use the advantages of different domains to create very robust watermarking scheme. A good example of a multiple domain method is presented in (Pramila et al, 008). The effectiveness of watermarking methods is usually given as a watermark detection rate in images once the images have gone through some kind of image processing attack. Attacks on a watermarked image can be intentional or unintentional, but any kind of attack will most probably decrease the detection rate of the method. However, we believe that the watermark detection rate of a method can be increased by means of image processing techniques for image enhancement, such as unsharp mask filtering and blind deconvolution. In this paper we investigate the influence of image enhancement on the detection rate of the dft-based image watermarking method. A database of 1000 images was used for the test. The images were watermarked, printed and scanned. The detection rate is calculated after ps process and compared to the detection rate after processing by means of image enhancement techniques.. Watermarking method A base for our research is the dft-based watermarking method with optimal implementation radius. The details of the method, as well as the detection rate after different attacks, are already published in (Poljicak et al, 011). This paper will thus provide only the outline of the method..1 encoding The watermark is embedded in a cover work in the magnitude coefficients of the Fourier domain. The block diagram of the encoder is shown in Figure 1. First, luminance values of the cover work are transformed in the Fourier domain. Then, by means of the secret key that represents the seed for the pseudo-random (PRND) number generator, the watermark is generated and implemented in the cover work, which can be expressed with this equation: M w ( x, y) = M ( x, y) + α W ( x, y) (1) where x and y are image coordinates, M is the magnitude of the cover image, W is the watermark matrix, α is the implementation coefficient, and Mw is the magnitude of the watermarked image. Finally, the watermarked magnitude coefficients (Fig. ) are combined with unaltered phase coefficients and transformed back to the spatial domain. The result is the watermarked image. 54

key as a seed. The cross-covariance of two vectors is actually a cross-correlation of the vectors with the removed mean value. The watermark detection is positive if the maximum value of cross-covariance exceeds a predefined detection value. Figure 1. Block diagram of the encoder Figure 3. Block diagram of the decoder 3. Image enhancement techniques Figure. Embedded watermark in the spectra of the Fourier domain (intensities of the watermark coefficients are exaggerated to be visible on the print).. decoding A decoder makes a blind iterative search for the implemented watermark. The original image is thus not required for detection. The only requirement is the key used for the generation of the watermark. Block diagram of the decoder is shown in figure 3. In order to test the existence of a watermark in an image, the image is resized to 51*51 pixels using bilinear interpolation. After scaling the image is transformed to the Fourier domain. The row-vectors are then extracted from the magnitude coefficients of the image from radii rmin to rmax. Each extracted vector is resized and normalized. After normalization, cross covariance is calculated between the extracted vector, and the row-vector generated with a pseudo-random generator using the original In this paper we are considering a case in which the degradation of a watermarked image is introduced by the ps process. ps process is hard to model, and there are several different approaches to the problem. Lin and Chang have modeled the ps process with an Inkjet printer, as the geometric distortion coupled with change of pixel values due to non-linearity of the conventional ps system (Lin & Chang, 1999). Furthermore, the degradation of an image in the ps process for closely related colors can be modeled as additive Gaussian noise (Poljicak et al, 010). Kang et al. state that the distortion of image dft coefficients includes both non-linear distortion and additive random noise and geometric transformations such as rotation, translation, scaling and cropping (Kang et al, 003). In all models above mentioned, the ps process, in its simplest form, can be considered as a low-pass filtering in which the high-frequency components of an image are attenuated. Therefore, in order to mitigate the degradation of a watermarked image in the ps process, debluring filters such are unsharp filter and blind deconvolution filter should be used. 55

3.1 unsharp filter Unsharp filter is a linear or non-linear filter that augments high-frequency components. There are different approaches to implement unsharp filter, but the most common way is by means of a negative Laplacian to extract highfrequency components in an image, which are then superimposed on the original image. Unsharp filter is mathematically defined as: g( x, y ) = f ( x, y ) f ( x, y ) () Where g(x,y) denotes an enhanced image, f(x,y) an original image, and Laplacian operator defined as: f ( x, y ) f ( x, y ) f ( x, y ) = + (3) x y Where f(x,y) represents an original image. 3.. blind deconvolution Blind deconvolution is a deconvolution technique that is used for the enhancement of blurred image from a single or a set of blurred images when a point spread function (psf) is poorly determined or unknown (Lam & Goodman, 000). It is based on the assumption that, due to the imperfections of imaging (scanner, camera, microscope), the image is convolved with the psf. psf is the mathematical function that describes the path distortion of a theoretical point source of light through the imaging system. So as to estimate the image before degradation, degraded image should thus be convolved with the invers of the psf. In practice, it is impossible tom find true psf, so an approximate estimation is usually used. Most blind deconvolution algorithms are therefore iterative, whereby each iteration tries to come closer to the real psf of the imaging system. 4. Experiment The results were obtained by means of the evaluation of detection value (correlation) from dataset of 1000 images which came through the process of ps process. The values of watermarked images after printing and scanning are compared to the values of the same images after they had been enhanced with unsharp and deconvolution filters. During the process of watermarking, the implementation factor for each image was chosen to produce a watermarked image with the psnr value around 40 db. The histogram of psnrs obtained is shown in figure 4. This value was chosen to provide watermarked images that are perceptually indistinguishable from original images. An example of watermark embedding is shown in figure 5. Frequency of Occurance 300 50 00 150 100 50 0 30 3 34 36 38 40 4 44 46 48 50 PSNR (db) Figure 4. Histogram of the psnr values of watermarked images Figure 5. Example of watermark embedding; a) original image, and b) watermarked image (psnr=41db) 56

For the evaluation of the influence of enhancement techniques on the performance of a detector, detection rate, watermark detection probability and roc curves were used. Detection rate was calculated upon images before and after enhancement filtering. For the detection of a watermark in an image, correlation of extracted vector with the generated vector has to exceed a value set as the threshold. The probability of the detection of a watermark in an image thus depends on the threshold value. For that reason, the function of the probability of the detection for different threshold values is also calculated. In order to show the performance of the detector without the influence of the predefined threshold value, roc curves were used. A roc curve is a graphical plot of the probability of true detection versus the probability of false detection (Lin et al, 001.) Table 1. Detection rates of the images for threshold value of 0,30. Probability of true positive detection 1 0.8 0.6 0.4 0. ps process Unsharp filter Deconvolution filter 81,5% 89,5 % 89.0 % PS process Unsharp filtering Deconvolution filtering 0 0 0. 0.4 0.6 0.8 1 Threshold value Figure 6. Probability of true positive detection before and after enhancement filtering 5. Results The experiment showed that the use of enhancement techniques can improve the detection rate of a watermarking method considerably. Table 1 features detection rates before and after enhancement, when threshold value is set to 0,30. This threshold value is chosen because the lowest detection value for the dataset of unprocessed images (detection value immediately upon watermark embedding) was 0,30. The results from the table show that, the detection rate for images that had been degraded in ps process and then enhanced with unsharp filter increased by 10 percent, from 81,5 % before unsharp filtering to 89,5 % after filtering, when this particular watermarking method was used. Similar results were obtained for deconvolution filter with only slightly worse overall improvement of the detection rate than compared to the first case when unsharp filter was used. Since the detection rate of a watermarking method depends on the threshold value chosen, it is better to show the influence of the enhancement filtering on the detection probability curve because it shows the probability of true positive detection for any given threshold value. Figure 6 clearly shows the improvement of detection probability when image enhancement techniques are used. To avoid the influence of the threshold value altogether, the influence of the enhancement techniques on the performance of the detector is shown as a roc curve on figure 7. roc curve shows the influence of the probability of false positive detection on the probability of true positive detection. The probability of false positive detection is the probability that the detection value for unwatermarked image will be higher than threshold value chosen (Poljicak et al., 011). Since the probability of false positive detection is hard to determine empirically (for 57

higher detection values) on real watermarking systems, it should be modeled by means of a theoretical model such as the one proposed in (Xang et al., 003) and (Miller & Bloom, 005). In this paper the same model for the estimation of the probability of false positive detection was used. Figure 7 shows considerable improvement of the detector performance when image enhancement techniques are used. When images are enhanced, the probability of the true positive is kept above 0.8 for much lower false positive probability (10-5 ) than in the case without an enhancement (10-3 ). It should be noted that since unsharp filter is computationally much simpler than deconvolution filter, it is much faster during processing. On a dual core GHz processor unsharp filtering of an average image took about 0.75 seconds, while for the same image blind deconvolution with 10 iterations took about 5 seconds. Probability of true positive detection 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0. PS process 0.1 Unsharp filtering Deconvolution filtering 0 10-10 10-9 10-8 10-7 10-6 10-5 10-4 10-3 10-10 -1 10 0 Probability of false positive detection Figure 7. roc curve We compared our method with the methods proposed in (Kang et al., 003) and (Solanki et al. 004). The main benefits of the proposed method and the image enhancement techniques are low computational demands, the possibility to be used with different printing methods (inkjet, laser, printing press, etc.) and high robustness to different attacks. Simplicity is another advantage of our method. It takes only about 1 s for watermark extraction, whereas the method proposed in (Kang et al. 003) takes 9 s for the extraction. Solanki et al. state that their method is only suitable for a laser printer reproduction, and our method works equally well with other kind of reproduction devices and techniques. Furthermore, our method requires a much lower scanning resolution for watermark extraction (150 dpi) than the method proposed by Solanki et al. (600 dpi). 6. Conclusion We can conclude that the use of image enhancement techniques can considerably improve the detection rate of the image watermarking methods. It is clear that the image enhancement before detection not only improves overall detection rate, but also enables the use of higher threshold values, which in turn gives better detection performance with smaller probability of false positive detection. Furthermore, we conclude that unsharp filtering is more appropriate than blind deconvolution since it gives slightly better results with considerably faster computation. The type of enhancement filtering should be chosen according to the type of the attack on a watermarked image. Future research will be focused on the determination of the most appropriate enhancement technique for different types of attack, such as JPEG compression, median filtering and printcam process. References Cheddad, A., Condell, J., Curran, K., Mc Kevitt, (010), Digital image steganography: Suvey and analysis of current methods in Signal Processing 90, 010, pp. 77-75. He, D. & Sun, Q., (005), A Practical Printscan Resilient Watermarking Scheme. IEEE Proc. of ICIP, 005 vol 1, pp. 57 60 58

Kang, X., Huang J., Shi, Y. Q., & Lin, Y., (003), ADWT-dft composite watermarking scheme robust to affine transform and JPEG compression, IEEE Trans. Circuits Syst. Video Technol. 13(8), pp 776 786 Kang, X., Huang, J., Zeng, W. (010), Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping. IEEE Trans. On Information Forensics And Security, Vol. 5, No. 1, March 010 Lam, E. Y. & Goodman, J. W., (000), Iterative statistical approach to blind image deconvolution, J. Opt. Soc. Am. A 17, pp 1177-1184 Lin, C. Y. & Chang, S. F., (1999), Distortion modeling and invariant extraction for digital image print-and-scan process. In Intl. Symposium on MultimediaInformation Processing, December 1999. Lin, C. Y., Wu, M., Bloom, J., Cox, I., M. Miller, & Y. Lui, (001) Rotation, scale, and translation resilient watermarking for images, IEEE Trans. Image Process. 10(5), 767 78 (001). Miller, M. L. & Bloom, J. A., Computing the probability of false watermark detection, Information Hiding, LNCS, Vol. 1768, pp. 146 158, Springer, Berlin/Heidelberg (005). Poljicak, A., Mandic, L., Agic, D., Strgar Kurecic M., (010), The influence of Watermark Properties on the Quality of a Watermarked Image, Proceedings ELMAR-010, Zagreb : Croatian Society Electronics in Marine-ELMAR, pp. 17-130 Poljicak, A., Mandic, L., Agic, D., (011), Discrete Fourier transform based watermarking method with an optimal implementation radius, J. Electron. Imaging 0 (3), pp 033008-1-033008-8 59

Pramila, A, Keskinarkaus, A., Seppänen T. (008) Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding in, Lecture Notes in Computer Science, Springer- Verlag Berlin Heidelberg, 008, pp. 79-93 Raja, K.B., Chowdary, C.R., Venugopal, K.R. Patnaik, L.M, (005), A secure image steganography using LSB, DCT and compression techniques on raw images, in: Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, ICISIP 05, Bangalore, India, 14 17 December 005, pp. 170 176. Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S., (004), Estimating and Undoing Rotation for Print-scan Resilient Data Hiding. In: IEEE International Conference on Image Processing, 004, vol. 1, pp. 39 4 60