A DWT BASED MULTI LEVEL DIGITAL WATERMARKING TECHNIQUE FOR IMAGES

RAHUL PATHAK1*, ABHISHEK KATARIYA2*, TOMAR G.S.3*, PRAJAPAT K.K.4*
1Department of Electronics & Comm. Engineering, Sri Balaji College of Engg. & Tech., Jaipur (Raj.), India
2Department of Electronics & Comm. Engineering, Sri Balaji College of Engg. & Tech., Jaipur (Raj.), India
3Director, MIR Lab, Gwalior (M.P.), India
4Department of Electronics & Comm. Engineering, Sri Balaji College of Engg. & Tech., Jaipur (Raj.), India
* Corresponding Author : kkprajapat2004@rediffmail.com

Received : 24-08-2011     Accepted : 20-09-2011     Published : 01-12-2011
Volume : 2     Issue : 2       Pages : 36 - 41
J Signal Image Process 2.2 (2011):36-41

Cite - MLA : RAHUL PATHAK, et al "A DWT BASED MULTI LEVEL DIGITAL WATERMARKING TECHNIQUE FOR IMAGES." Journal of Signal and Image Processing 2.2 (2011):36-41.

Cite - APA : RAHUL PATHAK, ABHISHEK KATARIYA, TOMAR G.S., PRAJAPAT K.K. (2011). A DWT BASED MULTI LEVEL DIGITAL WATERMARKING TECHNIQUE FOR IMAGES. Journal of Signal and Image Processing, 2 (2), 36-41.

Cite - Chicago : RAHUL PATHAK, ABHISHEK KATARIYA, TOMAR G.S., and PRAJAPAT K.K. "A DWT BASED MULTI LEVEL DIGITAL WATERMARKING TECHNIQUE FOR IMAGES." Journal of Signal and Image Processing 2, no. 2 (2011):36-41.

Copyright : © 2011, RAHUL PATHAK, et al, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

The digital watermarking of still images based on the concept of multiresolution wavelet fusion is proposed. The proposed method for the digital watermarking is based on the two-dimensional discrete wavelet transform. It decomposes original image in DWT domain in to three hierarchical levels and watermarks it with a logo image. The watermark is added to the DWT image according to a certain threshold. The proposed approach embeds a meaningful data in form of a logo image instead of a pseudo-random number sequence, called as image-fusion watermarking. This approach show that a watermark signal can be embedded in high-pass wavelet coefficients without any impact on the image visual fidelity. The results prove that the proposed scheme has an efficient performance in terms of robustness to a variety of attacks.

Keywords

Digital watermarking; discrete wavelet transform; pseudo-random number sequence; image-fusion watermarking; high-pass wavelet coefficient

Introduction

Digital contents in the form of text document, still image, motion picture, and music etc. are widely used in our normal life nowadays. Rapidly growing field of digitized images, video and audio has urged for the need of copyright protection, which can be used to produce evidence against any illegal attempt to either reproduce the digital media or to manipulate them in order to change the very identity of them. It has been recognized for quite some time that current copyright laws are inadequate for dealing with digital data. This has led to an interest towards developing new copy deterrence and protection mechanisms. One such effort that has been attracting increasing interest is based on digital watermarking techniques.
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control. Digital watermarking has become an active and important area of research, and development and commercialization of watermarking techniques is being deemed essential to help address some of the challenges faced by the rapid proliferation of digital content.
Ideal characteristics of a digital watermark have been stated [1] . These characteristics include:
1. Perceptual invisibility.
2. Statistical invisibility.
3. Fairly simple extraction should be.
4. Accurate detection.
5. Robustness to filtering, additive noise, compression, and other image manipulations.
6. Ability to determine the true owner of the image.
A lot of work is being conducted in different branches in this field. Steganography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection [2] . Among the two basic modalities for image watermarking encoding: spatial domain techniques and frequency domain techniques, most of the spatial watermarking schemes provide simple and effective ways for embedding an invisible watermark into the cover image, but they are usually not robust to common image alternations. Casting watermarks in the frequency domain can provide more protection under most signal processing and high ratio compression attacks.
In this paper, a new technique for the digital watermarking of still images based on the concept of two-dimensional discrete wavelet transform is intended. It decomposes original image into three hierarchical levels of DWT domain with the Haar wavelet filter, and watermarks it with a logo image instead of a pseudo-random number sequence. This is unlike most previous work, which used a random number of a sequence of bits as a watermark and where the watermark can only be detected by comparing an experimental threshold value to determine whether a sequence of random signals is the watermark. The logo image, generally smaller than the host image, is put into the high frequency band of the host image which has been wavelet transformed.
There are two important advantages of embedding a logo image as watermark data. First, the extracted image can be correlated with the originally embedded image by a human observer, building on the superior pattern-matching capabilities of the human brain. Second, the existence of a visual logo in the questionable image might be much better proof of ownership than a high statistical correlation value.
In this method, embedding can be applied to HL, LH, HH sub-bands at all levels of decomposition and to LL detail at the third level. Thus if a particular kind of noise affects a particular frequency band, then the watermark can be extracted from other sub-band.
Investigation on performances of the proposed technique for the digital watermarking of still images in terms of robustness to a variety of attacks, such as JPEG compression, blurring attack, deblurring attack, rotation by 4 degrees, average filter, salt n pepper noise, and AWGN noise attack has been studied. Experiments show that the corresponding watermark can still be correctly identified at each possible resolution in the wavelet domain.
In the following, we describe the DWT and the proposed watermarking method in detail. One of the main advantages of the discrete wavelet transform (DWT) is to describe more accurately aspects of human vision system (HVS) as compared to DFT and DCT. Therefore, it is imperative to study watermarking schemes in the wavelet transform domain.

Watermarking In The Wavelet Domain

Transform domain watermarking techniques apply some invertible transform to the host image before embedding the watermark. Then, the transform domain coefficients are modified to embed the watermark and finally the inverse transform is applied to obtain the marked image. The transforms commonly used for watermarking purposes are the discrete cosine transform (DCT), the discrete Fourier transform (DFT), the fractal transform and the discrete wavelet transform (DWT) but there are also approaches dealing with more "exotic" transforms such as the Fresnel transform, the complex wavelet transform (CWT), the Fourier-Mellin transform and others.
Transform domain watermarking algorithms possess a number of desirable properties. Since the watermark embedded in the transform domain is irregularly distributed over the area of local support after the inverse transformation, these methods make it more difficult for an attacker read or modify the mark. For watermarking strategies that depend on the global DCT this means the watermark is spread over the entire image. The wavelet transform or a block-based DCT only affects the local region. Furthermore, the frequency representation of the images allows selecting only certain bands of the host signal for watermarking. The human visual system has been observed to process certain frequency bands individually which led to the development of visual models that try to capture these characteristics.
Algorithms operating in the frequency domain usually add the mark or its spread spectrum signal to a small subset of transform coefficients of the low or medium frequency range [3] . In spread spectrum techniques, a narrowband signal which represents the message to be transmitted is modulated by a broadband carrier signal, which broadens or spreads the original, narrow-band spectrum; hence termed as "spread spectrum".
The low- and mid-frequency components of the image data represent most of the perceptual important information. Therefore, compression schemes and other image processing operations can hardly affect this significant portion of the host image without destroying much of the visual content of the image. Thus, adding the watermark in significant coefficients of the transform domain generally improves robustness. Spatial domain watermarking methods have to indirectly model the low-frequency component of the host image signal, which can be quite complicate to achieve [4] .
In the DCT domain, the energy concentrates in the low frequency regions around the upper-left corner. The multi-resolution DWT representation has the low frequency components of the image signal in the approximation sub-band, also located in the upper-left corner, while the high-frequency components are represented in the detail sub-bands at several resolutions. Most energy of the detail sub-bands is situated in edge areas and textured regions.
The main disadvantages of frequency transform domain techniques are their computational cost, and, in the case of a global transform, their problem to adapt the watermark strength to the local image activity, making it more difficult to exploit certain characteristics of the HVS such as masking effects. The later shortcoming can be resolved by using the wavelet transform which provides both, frequency and spatial information of the host image.
Finally, advantages of the DWT are [5,6] :
1. The wavelet transform is a multi-resolution description of an image. The decoding can be processed sequentially from a low resolution to the higher resolutions.
2. The wavelet transform is closer to the human visual system (HVS) than the DCT, since it splits the signal into individual bands that can be processed independently. Hence, the artifacts introduced by wavelet domain coding with high compression ratio are less annoying than those introduced at the same bit rate by the DCT.
3. The high resolution sub-bands allow locating image features such as edges or textured area easily in the transform domain. Watermarking schemes often put more watermark energy into large DWT coefficients, thus affecting mostly regions, like edges and texture the HVS is not sensitive to.
4. Lower computational cost than the FFT or DCT.

The Proposed Watermaking Algorithm

A. Embedding Process
The proposed wavelet based watermark embedding scheme is shown in [Fig-1] . The host image (I) is decomposed in DWT domain in to three hierarchical levels with a Haar filter. Let the resulting image be IDWT, which is the combination of the 10 sub-bands (LL, HL, LH, HH).
The DWT coefficients, f having high entropy values are selected for each block in which the watermark is to be inserted. The number of DWT coefficients depends on total pixel in the watermark. The watermark is added in high value coefficients so that it spreads uniformly all over the image.
The logo image to be watermarked (W) is acquired and resized to 50x50 dimension. The signature data becomes a sequence ωi of length 2500, that is embedded in a suitably selected subset of the DWT coefficients, f.
Binary watermark image pixel is embedded by embedding formula:





Here α is weighting factor and is equal to 0.03.
In our method, embedding can be applied to HL, LH, and HH sub-bands at all levels of decomposition and to LL detail at the third level. Thus if a particular kind of noise affects a particular frequency band, then the watermark can be extracted from other sub-band.
The watermarked image is obtained by taking the inverse DWT.

B. Detection Process
To obtain the watermark (W’), the attacked image (I’) and the original image (I) is again subjected to third level DWT, resulting into 10 sub-bands (LL, HL, LH, HH).





We subtract the same index of coefficients of sub-band of Y (for example LH3 or LH2), by the coefficients of sub-band of Y’ for the length of watermark.





Thus, we obtain the extracted watermark W’. The proposed watermark extraction scheme is shown in [Fig-2] .
Here, the extracted watermark W’ is a visually recognizable image. However, the subjective measurement is dependent on factors such as views. Therefore, we measure the similarity of original watermark W and extracted watermarks W’ by the normalized correlation (NC) coefficient that is defined as



The NC belong (0,100). The higher the NC values, the more similar the embedded watermark is to the extracted one.

Performance Evaluation

The proposed perceptual watermarking framework is implemented for evaluating both properties of imperceptibility and robustness in a high payload. The 512×512 grey scale Home image, shown in [Fig-3] is taken as the host image to embed a 50×50 binary watermark image, shown in [Fig-4] . For the entire test results in this paper, MATLAB Version 7.0.0.19920 (R14) software is used. Also for computing the wavelet transforms, Haar wavelet is used. The reason for the use of Haar wavelet is that, it is the only known wavelet that is compactly supported, orthogonal and symmetric. Haar wavelets are basically same as Daubechies wavelet db1 (in MATLAB) or Daub4. The compact support of the Haar wavelets enables the Haar decomposition to have good time localization. Specifically, this means that the Haar coefficients are effective for the efficient representation of signals with small support.
The unattacked watermarked image is shown in [Fig-5] .
In our method, embedding can be applied to HL, LH, HH sub-bands at all levels of decomposition and to LL detail at the third level. Here the horizontal sub-band HL at level two and three is represented by CH2 and CH3 respectively. Similarly, the vertical sub-band LH at level three is represented by CV3.
The peak signal-to-noise ratio (PSNR) was used to evaluate the quality of the watermarked image. The PSNR is defined as [6] :



Mean-square error (MSE) is defined as:



Where h(i,j), and h'(i,j) are the gray levels of pixels in the host and watermarked images, respectively. The larger the PSNR is, the better the image quality is.
The proposed watermarking approach yields satisfactory results in watermark imperceptibility and robustness. The PSNR of the watermarked images produced by the proposed approach is 26.13 dBs, and NC between original watermark image and extracted watermark image is equal to 1. There is no perceptual distortion in the original and watermarked image, which means the scheme has satisfied the criteria that an efficient watermark should be unobtrusive, discreet and easily extracted.
In practice, a watermarked image may be attacked either on purpose or accidentally, so the watermarking system should still be able to detect and extract the watermark. Additive noise, filtering, cropping and compression are the best-known attacks of all attacks. Some of them may be intentional or unintentional, depending on the application. To test the robustness of the proposed algorithm to attacks, we attacked on purpose watermarked image by JPEG compression, additive noise, filtering, rotation, etc., and extracted the watermark image from corrupted watermarked image.

C. JPEG Compression

The Home image was watermarked under embedding algorithm then sent through the detector algorithm after JPEG compression. During JPEG compression image data will be lost which will affect the detector’s ability to correctly detect the watermark. The image was compressed with quality of 100% to 10%. Hundred being the compressed image having a high quality to 10 being compressed image having a very low quality.
The calculated SNR and correlation coefficients between original watermark and watermarks extracted from various sub-bands with respect to JPEG compression quality factor are shown in Table I.
The extracted watermarks from various DWT sub-bands after JPEG compression are shown in [Fig-6] .
[Fig-7] , [Fig-8] , [Fig-9] and [Fig-10] show the watermark detection responses graphically.

D. Other Attacks
The watermarked Home image was sent through the detector algorithm after blurring attack, deblurring attack, rotation by 4 degrees, average filter, salt n pepper noise, and AWGN noise attack. The results of the extracted watermarks are shown in [Table-II] .
The extracted watermarks from various DWT sub-bands after various attacks are shown in the [Fig-11] .
The NC between original watermark image and extracted watermark image indicates that the algorithm shows good performances against common signal processing procedures except rotation by 4 degrees.

Conclusion

The results shows that this technique can survive JPEG compression and is robust to a variety of other attacks, such as blurring attack, declaring, rotation by 4 degrees, average filter, salt n pepper noise, and AWGN noise attack.
Finally, by showing that the watermarked images are visually identical to their unmarked originals, experimental results have demonstrated the effectiveness of this approach. Therefore, the proposed technique shows excellent promise as it allows the authentication of digital images without preventing their efficient storage

References

[1] Prasad Manjunatha and Koliwad Shivaprakash (2009) International Journal of Computer Science and Network Security (IJCSNS), vol.-9, no.-4, pp. 91-107.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Cox Ingemar J., Miller Matthew L., Bloom Jeffrey A., Fridrich Jessica, and Kalker Ton (2008) “Digital Watermarking and Steganography”, ISBN 978-0-12-372585-1, Morgan Kaufmann Publishers.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Cox Ingemar J., Kilian Joe, Leighton Tom, and Shamoon Talal G. (1997) In Proceedings of the IEEE International Conference on Image Processing, ICIP ’97, vol.-6, pp. 1673-1687, Santa Barbara, California, USA, October .  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Bruyndonckx O., Quisquater Jean-Jacques, and Macq Benoit M. (1995) In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pp. 456- 459, Marmaras, Greece.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Dugad Rakesh, Ratakonda Krishna, and Ahuja Narendra (1998) In Proceedings of the IEEE International Conference on Image Processing, ICIP ’98, Chicago, IL, USA.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Xia X.G., Boncelet C. G. and Arce G. R. (1998) Optics Express, pp. 497-511.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

Images
Fig. 1- Watermark embedding process
Fig. 2- Watermark extraction process
Fig. 3- Grey scale Home image (host image)
Fig. 4- Watermark image
Fig. 5- Watermarked image
Fig. 6a- Extracted watermarks for JPEG Q.F.=100%
Fig. 6b- Extracted watermarks for JPEG Q.F.=80%
Fig. 6c- Extracted watermarks for JPEG Q.F.=50%
Fig. 6d- Extracted watermarks for JPEG Q.F.=30%
Fig. 6e- Extracted watermarks for JPEG Q.F.=10%
Fig. 7- SNR versus JPEG compression Q.F.
Fig. 8- NC of extracted watermark from CH2 w.r.t. JPEG comp. Q.F.
Fig. 9- NC of extracted watermark from CH3 versus JPEG comp. Q.F.
Fig. 10- NC of extracted watermark from CV3 versus JPEG comp. Q.F.
Fig. 11a- Extracted watermarks after blurring attack
Fig. 11b- Extracted watermarks after deblurring attack
Fig. 11c- Extracted watermarks after rotation by 4 degrees
Fig. 11d- Extracted watermarks after average filtering
Fig. 11e- Extracted watermarks after salt n pepper noise attack
Fig. 11f- Extracted watermarks after AWGN noise attack
Table I- SNR AND NC AFTER JPEG COMPRESSION ATTACK
TABLE II- SNR AND NC AFTER VARIOUS ATTACKS