4. EXPERIMENTAL RESULTS
In order to verify the effectiveness of the proposed algorithm, experiments are carried out using 24-bit true color host images of size 512x512 commonly called “Lena”, “Peppers”, and “Baboon” as in
Fig. 2
.A gray image of size 64x64 shown in
Fig. 3
has been used for the digital watermark.
The three host images (512x512)
The watermark image (64x64)
For demonstrating the watermark embedding and extraction processes, let us take an example of “Lena” image. The image in RGB color space is first converted to one in YCbCr color space. The values of the Cb component are then divided into 64x64 blocks, from which the private key K is extracted. The key has the size of 4x64x64 and looks like
Fig. 4
. The 4-fold replications of the watermark image as
Fig. 5
are embedded into the key after its scrambling. The result of the scrambling looks like
Fig. 6
. An XOR operation is utilized to embed the scrambled into the key. Finally, we get the watermarked key (i.e. the zero-watermark) of
Fig. 7
. We should keep the watermarked key into the third party to preseve the ownership of the host image.
The private key extracted from “Lena”
The 4-fold replication of the watermark image
The scrambled result
The watermarked key (the zero-watermark)
The extraction process is the reverse of the embedding process. Let’s assume the test image is the same with the host image. If we apply an XOR operation to the private key
Fig 4
extracted from the test image and the watermarked key, we get the scrambled image of
Fig. 6
. Through unscrambling, we get the extracted watermark image of
Fig 5
. Using any strategy, we get the watermark image of
Fig. 3
.
In this study, performance comparison is carried out among the 3 CRT-based watermarking schemes: the scheme of Patra et al.
[5]
, DCT0CRT
[6]
, and the scheme proposed in this paper, considering the quality of the watermarked images, the quality of the watermarks extracted, and robustness of the schemes to different attacks. The quality of modified (watermarked) images against the host image is measured by Peak Signal-to-Noise Ratio (PSNR), which is given by the following equation:
Because DCT0CRT and the scheme proposed in this paper are using the zero-watermarking technique which makes watermarked images distortion-free, quality of watermarked images in PSNR is infinitive by the definition of (8) and is better than that of Patra et al.’s as the following table shows.
Quality of watermarked images compared with respective host image
Quality of watermarked images compared with respective host image
Comparative experiments of robustness resisting typical kinds of conventional attacks such as sharpening, blurring, JPEG lossy compression (quality factor 90), cutting edges, and cutting a quadrant have been performed. Samples of the zero-watermarked Lena images under the attacks are shown in
Fig. 8
.
Zero-watermarked Lena image under different attacks: (a) without attack, (b) sharpening, (c) blurring, (d) JPEG lossy compression, (e) cutting edges, and (f) cutting a quadrant.
The quality of an extracted watermark is determined by its TAF value. A lower TAF value indicates that the extracted watermark is more similar to the original watermark. The extracted watermarks from the watermarked Lena images can be summarized by as in
Table 2
, those from the watermarked Peppers images in
Table 3
, and those from the watermarked Baboon images in
Table 4
.
Comparison of extracted watermarks for Lena (Values in TAF)
Comparison of extracted watermarks for Lena (Values in TAF)
Comparison of extracted watermarks for Peppers (Values in TAF)
Comparison of extracted watermarks for Peppers (Values in TAF)
Comparison of extracted watermarks for Baboon (Values in TAF)
Comparison of extracted watermarks for Baboon (Values in TAF)
As you can see from the tables, the scheme of Patra et al. does not show better performance than the other two schemes under all attacks. Even without any attacks, extracted watermarks have some errors due to the rounding in the conversion of RGB and YCrCb as well as the watermark embedding. Furthermore, it is hard to recognize the symbol of the watermark image from extracted watermarks in attacks other than sharpening. If we select a TAF value as the threshold for watermark detection, e.g., 5.0%, it is impossible to detect the watermark from all the attacked images in the scheme.
The scheme of DCT0CRT and the proposed scheme show much better performance than that of Patra et al. However, under attacks of cropping (edges and a quadrant), performance of the DCT0CRT scheme is not so good. On the other hand, good performance is retained in the proposed scheme even under the cropping attacks due to the redundancy in watermark embedding and voting in extraction.
5. CONCLUSION
In this paper, a novel zero-watermarking scheme for color images has been presented. It applies DCT and CRT to the blue chrominance channel of color images in the YCrCb color space. As in watermarking host images conventionally with CRT, where watermark images are robust in spite of damages in host images, the proposed zero-watermarking scheme has a very strong robustness against different attacks. In addition, it has no affect on the quality of the original image as zero-watermarking schemes do. The following can be concluded by the experimental results:
i) the performance of the scheme is fundamentally better than that of the conventional CRT-based scheme,
ii) the performance of the scheme is mostly better than that of the CRT-based zero-watermarking scheme for gray images, and
iii) redundant embedding of a watermark and voting in the watermark extraction improves the quality of extracted watermarks, especially in cropping.
Further research directs toward how to apply the scheme to diverse applications such as sharing delivery receipts watermarked for identifying their receivers in mobile environments.
BIO
HyoungDo Kim
He received his B.S. in industrial engineering from Seoul National University, Korea and also received his M.S. and Ph.D. degrees in management science from KAIST. Since then, he worked for a telecommunication company in the research of electronic commerce and Internet services for more than 6 years. He joined the faculty of Hanyang Cyber University in 2003. His main research interests include data mining, electronic commerce, digital watermarking, and e-learning.
Hanqiang C.
,
Hua X.
,
Xutao L.
,
Miao L.
,
Sheng Y.
,
Fang W.
“A Zero-Watermarking Algorithm Based on DWT and Chaotic Modulation,”
Proc. of SPIE
Apr. 2006
vol. 6247
624716-1 -
624716-9
Zhang L.
,
Cai P.
,
Tian X.
,
Xia S.
“A Novel Zero-Watermarking Algorithm Based on DWT and Edge Detection,”
Proc. of 4th Int. Congress on Image and Signal Processing
Oct. 15-17, 2011
1016 -
1020
Leng X.
,
Xiao J.
,
Wang Y.
“A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA,”
Proc. of 1st Int. Conf. on Communications and Information Processing
Mar. 7-11, 2012
484 -
492
Patra C.
,
Phua J. E.
,
Bornand C.
2010
“A Novel DCT Domain CRT-Based Watermarking Scheme for Image Authentication Surviving JPEG Compression,”
Digital Signal Processing
20
1597 -
1611
DOI : 10.1016/j.dsp.2010.03.010
Kim H. D.
,
Sohn K. S.
2011
“DCT Domain Zero- Watermarking Based on CRT,”
Journal of the Korea Contents Associations
11
(1)
9 -
15
DOI : 10.5392/JKCA.2011.11.1.009
Nasir I.
,
Weng Y.
,
Jiang J.
“A New Robust Watermarking Scheme for Color Image in Spatial Domain,”
Proc. of 3rd Int. IEEE Conf. on Signal-Image Technologies and Internet-based System
Dec. 16-18, 2007
942 -
947
Patra J. C.
,
Karthik A.
,
Bornand C.
2010
“A Novel CRTBased Watermarking Technique for Authentication of Multimedia Contents,”
Digital Signal Processing
20
(2)
442 -
453
DOI : 10.1016/j.dsp.2009.07.004
Dong C.
,
Li J.
,
Zhang H.
,
Chen Y.
“Robust Zero-Watermarking for Medical Image Based on DCT,”
Proc. of 6th Int. Conf. on Computer Sciences and Convergence Information Technology
Nov. 29 – Dec. 1, 2011
900 -
904
Feng G.
,
Huang X.
“An Improved DCT Based Zero-Watermarking Algorithm for Text Image,”
Proc. of 2012 Int. Conf. on Anti-Counterfeiting, Security and Identification (ASID)
Aug. 24-26, 2012
1 -
4
Zhang T.
,
Du Y.
“A Digital Watermarking Algorithm for Color Images Based on DCT,”
Proc. of Int. Conf. on Information Engineering and Computer Science (ICIECS)
Dec. 19-20, 2009
1 -
4
Sulong G. B.
,
Hasan H.
,
Selamat A.
,
Ibrahim M.
,
Saparudin
2012
“A New Color Image Watermarking Technique Using Hybrid Domain,”
Int. Journal of Computer Science Issues
9
(6)
109 -
114
Zhou Y.
,
Liu J.
“Blind Watermarking Algorithm Based on DCT for Color Images,”
Proc. of 2nd Int. Congress on Image and Signal Processing
Oct. 17-19, 2009
1 -
3
Li J.
,
Miao S.
“The Medical Image Watermarking Using Arnold Scrambling and DFT,”
Proc. of 2nd Int. Conf. on Computer Science and Electronics Engineering (ICCSEE)
Mar. 22-23, 2013
192 -
195
Kundur D.
,
Hatzinakos D.
1999
“Digital Watermarking for Telltale Tamper Proofing and Authentication,”
Proc. of the IEEE
87
(7)
1167 -
1180
DOI : 10.1109/5.771070