Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Similar documents
1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Invariant Image Watermark Using Zernike Moments

Digital Image Watermarking Algorithm Based on Wavelet Packet

Approximation of the Karhunen}Loève transformation and its application to colour images

Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption

Wavelet Packet Based Digital Image Watermarking

Empirical Analysis of Invariance of Transform Coefficients under Rotation

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Hiding Data in a QImage File

Elec4621 Advanced Digital Signal Processing Chapter 11: Time-Frequency Analysis

A Vision-Based Masking Model for Spread-Spectrum Image Watermarking

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Title: Watermark Estimation Through Detector Observations Author: Ton Kalker Conference: Benelux Signal Processing Symposium 98 Date and location:

The Gaussian transform. ALECU, Teodor, VOLOSHYNOVSKYY, Svyatoslav, PUN, Thierry. Abstract

Multimedia Networking ECE 599

Quantization Index Modulation using the E 8 lattice

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256

2. Definition & Classification

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Image Compression. Qiaoyong Zhong. November 19, CAS-MPG Partner Institute for Computational Biology (PICB)

1 Real functions. 1.1 What is a real function?

Quantization Based Watermarking Methods Against Valumetric Distortions

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University

Learning with Ensembles: How. over-tting can be useful. Anders Krogh Copenhagen, Denmark. Abstract

Sparse linear models

Direct Conversions Between DV Format DCT and Ordinary DCT

New Steganographic scheme based of Reed- Solomon codes

Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization

Rotation Invariant Texture Description obtained by General Moment Invariants A. Dimai Communications Technology Laboratory Swiss Federal Institute of

Information Hiding and Covert Communication

Double Sided Watermark Embedding and Detection with Perceptual Analysis

INTRODUCTION TO THE DFS AND THE DFT

ECG782: Multidimensional Digital Signal Processing

Digital Watermark Detection in Visual Multimedia Content

Data-Hiding Capacities of Non-Redundant Complex Wavelets

MOMENT functions are used in several computer vision

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy

Invariant Pattern Recognition using Dual-tree Complex Wavelets and Fourier Features

2. the basis functions have different symmetries. 1 k = 0. x( t) 1 t 0 x(t) 0 t 1

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable

2 P. L'Ecuyer and R. Simard otherwise perform well in the spectral test, fail this independence test in a decisive way. LCGs with multipliers that hav

CS711008Z Algorithm Design and Analysis

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 8, AUGUST

Utah Core State Standards for Mathematics Secondary Mathematics I

Lecture 3: Linear Filters

Lecture 3: Linear Filters

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Image Compression. Fundamentals: Coding redundancy. The gray level histogram of an image can reveal a great deal of information about the image

Frequency Domain Speech Analysis

Distributed computation of the number. of points on an elliptic curve

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting

Phase-Correlation Motion Estimation Yi Liang

In: Advances in Intelligent Data Analysis (AIDA), International Computer Science Conventions. Rochester New York, 1999

on a per-coecient basis in large images is computationally expensive. Further, the algorithm in [CR95] needs to be rerun, every time a new rate of com

Sequential and Dynamic Frameproof Codes

Performance Bounds for Joint Source-Channel Coding of Uniform. Departements *Communications et **Signal

SYDE 575: Introduction to Image Processing. Image Compression Part 2: Variable-rate compression

Compressing a 1D Discrete Signal

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and

Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur

Utah Math Standards for College Prep Mathematics

Boxlets: a Fast Convolution Algorithm for. Signal Processing and Neural Networks. Patrice Y. Simard, Leon Bottou, Patrick Haner and Yann LeCun

Decomposing Bent Functions

Image Data Compression

On New Radon-Based Translation, Rotation, and Scaling Invariant Transform for Face Recognition

Watermark Detection after Quantization Attacks

Dual Discrete Logarithms

visual tasks. For example, a set of annular operators can be used to identify enclosed symmetry points, and then a grouping algorithm is applied to re

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images

Approximation Metrics for Discrete and Continuous Systems

Information Theory and Coding Techniques

Lecture 7 Predictive Coding & Quantization

Curves, Cryptography, and Primes of the Form x 2 + y 2 D

0 o 1 i B C D 0/1 0/ /1

The New Graphic Description of the Haar Wavelet Transform

Error analysis for IPhO contestants

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

Transforms and Orthogonal Bases

COMPRESSED SENSING IN PYTHON

Analysis of Communication Systems Using Iterative Methods Based on Banach s Contraction Principle

A Novel Approach to the 2D Analytic Signal? Thomas Bulow and Gerald Sommer. Christian{Albrechts{Universitat zu Kiel

Mini Lecture 2.1 Introduction to Functions

Directionlets. Anisotropic Multi-directional Representation of Images with Separable Filtering. Vladan Velisavljević Deutsche Telekom, Laboratories

The DFT as Convolution or Filtering

Polynomial Residue Systems via Unitary Transforms Matthew G. Parker

E : Lecture 1 Introduction

Creating transformations for matrix obfuscation

Error Spectrum Shaping and Vector Quantization. Jon Dattorro Christine Law

Filtering, Frequency, and Edges

An Invariance Property of the Generalized Likelihood Ratio Test

Transcription:

Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image which may be used for Copyright Protection. This paper describes how Fourier-Mellin transform-based invariants can be used for digital image watermarking. The embedded marks are designed to be unaffected by any combination of rotation, scale and translation transformations. The original image is not required for extracting the embedded mark. Reference O'RUANAIDH, Joséph John, PUN, Thierry. Rotation, scale and translation invariant digital image watermarking. In: IEEE International Conference on Image Processing, 1997. Proceedings (ICIP 97). 1997. p. 536-539 DOI : 10.1109/ICIP.1997.647968 Available at: http://archive-ouverte.unige.ch/unige:47705 Disclaimer: layout of this document may differ from the published version.

ROTATION, SCALE AND TRANSLATION INVARIANT DIGITAL IMAGE WATERMARKING Joseph J.K. O Ruanaidh and Thierry Pun Centre Universitaire d'informatique, Universite de Geneve, Switzerland ABSTRACT A digital watermark is an invisible mark embedded in a digital image which may be used for Copyright Protection. This paper describes how Fourier-Mellin transform-based invariants can be used for digital image watermarking. The embedded marks are designed to be unaected by any comb ination of rotation, scale and translation transformations. The original image is not required for extracting the embedded mark. 1. INTRODUCTION Computers, printers and high rate digital transmission facilities are becoming less expensive and more widespread. Digital networks provide an ecient cost-eective means of distributing digital media. Unfortunately however, digital networks and multimedia also aord virtually unprecendented opportunities to pirate copyrighted material. The idea of using a robust digital watermark to detect and trace copyright violations has therefore stimulated signicant interest among artists and publishers. As a result, digital image watermarking has recently become a very active area of research. Techniques for hiding watermarks have grown steadily more sophisticated and increasingly robust to lossy image compression and standard image processing operations, as well as to cryptographic attack. Many of the current techniques for embedding marks in digital images have been inspired by methods of image coding and compression. Information has been embedded using methods including the Discrete Cosine Transform (DCT) [5, 2] Discrete Fourier Transform magnitude and phase, Wavelets, Linear Predictive Coding and Fractals. The key to making watermarks robust has been the recognition that in order for a watermark to be robust it must be embedded in the perceptually signicant components of the image [5, 2]. Objective criteria for measuring the degree to which an image component is signicant in watermarking have gradually evolved from being based purely on energy content [5, 2] to statistical and psychovisual criteria. The ability of humans to perceive the salient features of an image regardless of changes in the environment is something which humans take for granted [4]. We can recognize objects and patterns independently of changes in This work is supported by the Swiss National Science Foundation (grant no. 5003-45334) image contrast, shifts in the object or changes in orientation and scale. It seems clear that an embedded watermark should have the same invariance properties as the image it is intended to protect. Digital watermarking is also fundamentally a problem in digital communications [5, 7, 2]. In parallel with the increasing sophistication in modelling and exploiting the properties of the human visual system, there has been a corresponding application of advanced digital communication techniques such as spread spectrum [7, 5]. Synchronization of the watermark signal is of the utmost importance during watermark extraction. If watermark extraction is carried out in the presence of the cover image 1 then synchronization is relatively trivial. The problem of synchronizing the watermark signal is much more dicult to solve in the case where there is no cover image. If the stegoimage is translated, rotated and scaled then synchronization necessitates a search over a four dimensional parameter space (X-oset, Y-oset, angle of rotation and scaling factor). The search space grows even larger if one takes into account the possibility of shear and a change of aspect ratio. In this paper, the aim is to investigate the possibility of using invariant representations of a digital watermark to help avoid the need to search for synchronization during the watermark extraction process. 2. INTEGRAL TRANSFORM INVARIANTS There are many dierent kinds of image invariant such as moment, algebraic and projective invariants. In this section we will briey outline the development of several integral transform based invariants [1]. The invariants described below depend on the properties of the Fourier transform. There are a number of reasons for this. First, using integral transform-based invariants is a a relatively simple generalization of transform domain watermarking. Second, the number of robust invariant components is relatively large which makes it suitable for spread spectrum techniques. Third, as we shall see, mapping to and from the invariant domain to the spatial domain is welldened and it is in general not computationally expensive. 1 This paper will make use of terms agreed during the 1996 Workshop on Information Hiding [6]. The term \cover image" will be used to describe the unmarked original image and the term \stegoimage" for an image with one or more hidden embedded marks.

2.1. The Fourier Transform Let the image be a real valued continuous function f(x 1; x 2) dened on an integer-valued Cartesian grid 0 x 1 < N 1; 0 x 2 < N 2. Let the Discrete Fourier Transform (DFT) F (k 1; k 2) where 0 k 1 < N 1; 0 k 2 < N 2 be dened in the usual way [3]. 2.1.1. The Translation Property Shifts in the spatial domain cause a linear shift in the phase component. F (k 1; k 2) exp [ j(ak 1 + bk 2)] $ f(x 1 + a; x 2 + b) (1) Note that both F (k 1; k 2) and its dual f(x 1; x 2) are periodic functions so it is implicitly assumed that translations cause the image to be \wrapped around". We shall refer to this as a circular translation. 2.1.2. Reciprocal Scaling Scaling the axes in the spatial domain causes an inverse scaling in the frequency domain. 1 F ( k1 ; k2 ) $ f(x1; x2) (2) 2.1.3. The Rotation Property Rotating the image through an angle in the spatial domain causes the Fourier representation to be rotated through the same angle. F (k 1 cos k 2 sin ; k 1 sin + k 2 cos ) $ f(x 1 cos x 2 sin ; x 1 sin + x 2 cos ) 2.2. Translation Invariance From the translation property of the Fourier transform it is clear that spatial shifts aect only the phase representation of an image. This leads to the well known result that the DFT magnitude is a circular translation invariant. An ordinary translation can be represented as a cropped circular translation. 2.3. Rotation and Scale Invariance The basic translation invariants described in section 2.2 may be converted to rotation and scale invariants by means of a log-polar mapping. Consider a point (x; y) 2 < 2 and dene: x = e cos y = e sin where 2 < and 0 < 2. One can readily see that for every point (x; y) there is a point (; ) that uniquely corresponds to it. Note that in the new coordinate system scaling and rotation are converted to a translation of the and coordinates respectively. At this stage one can implement a rotation and scale invariant by applying a translation invariant in the log-polar coordinate system. Taking the Fourier transform of a log-polar map is equivalent to computing the Fourier-Mellin transform [1]. (3) (4) 2.4. Rotation, Scale and Translation Invariance Consider two invariant operators: F which extracts the modulus of the Fourier transform and FM which extracts the modulus of the Fourier-Mellin transform. Applying the hybrid operator FM F to an image f(x; y) we obtain: I 1 = [FM F] f(x; y) (5) Let us also apply this operator to an image that has been translated, rotated and scaled: I 2 = [FM F R() S() T (; )] f(x; y) = [FM R() F S() T (; )] f(x; y) (6) = FM R() S( 1 ) F T (; ) f(x; y) (7) = [FM F] f(x; y) (8) = I 1 (9) Hence I 1 = I 2 and the represention is rotation, scale and translation invariant. Steps 6 and 7 follow from the rotation and reciprocal scaling properties of the DFT [1]. The rotation, scale and translation (RST ) invariant just described is sucient to deal with any combination or permutation of rotation, scale and translation in any order [1]. 3. WATERMARKING IMPLEMENTATION Figure 1 illustrates the process of obtaining the RST transformation invariant from a digital image. Figure 1 is for illustrative purposes only since the process used in practice is more complicated. The watermark takes the form of a two dimensional spread spectrum signal in the RST transformation invariant domain. Note that the size of the RST invariant representation depends on the resolution of the log-polar map which can be kept the same for all images. This is a convenient feature of this approach which helps to standardise the embedding and detection algorithms. 4. EXAMPLES Figure 2 is a standard image which contains a 104 bit rotational and scale invariant watermark. The watermark is encoded as a spread spectrum signal which was embedded in the RS invariant domain. Figure 2 was rotated by 143 O and scaled by a factor of 75% along each axis. The embedded mark which read \The watermark" in ASCII code was recovered from this stegoimage. It was also found that the watermark survived lossy image compression using JPEG at normal settings (75% quality factor). Other methods exist that tolerate JPEG compression down to 5% quality factor [2, 5]; work is underway to combine these with this approach. In addition, the mark is also reasonably resistant to cropping and could be recovered from a segment approximately 50% of the size of the original image. 5. CONCLUSION This paper has outlined the theory of integral transform invariants and showed that this can be used to produce watermarks that are resistant to translation, rotation and

RST Invariant Amp Phase FFT IFFT Amp LPM Phase ILPM FFT IFFT Image Figure 1: A diagram of a prototype RST invariant watermarking scheme. Figure 2: A watermarked image of a mandrill that has been rotated by 143 degrees and scaled by 75%. The embedded mark was recovered from this image. scaling. The importance of invertibility of the invariant representation was emphasised. One of the signicant points is the novel application of the Fourier-Mellin transform to digital image watermarking. An example of a rotation and scale invariant watermark was presented. As one might expect, this proved to be robust to changes in scale and rotation. It was also found to be weakly resistant to lossy image compression and cropping. The robustness of the embedded mark to these attacks will be greatly improved with future work. On its own, the invariant watermark discussed in this paper cannot resist changes in aspect ratio or shear transformations. There is no obvious means of constructing an integral transform-based operator that is invariant to these transformations. However, work is currently in progress to nd a means of searching for the most likely values of aspect ratio and shear factor, and then to apply the necessary corrections during watermark extraction. 6. REFERENCES [1] R. D. Brandt and F. Lin. Representations that uniquely characterize images modulo translation, rotation and scaling. Pattern Recognition Letters, 17:1001{1015, August 1996. [2] I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In Proceedings of the IEEE Int. Conf. on Image Processing ICIP-96, pages 243{246, Lausanne, Switzerland, September 16-19 1996. [3] Jae S. Lim. Two-Dimensional Signal and Image Processing. Prentice-Hall International, 1990. [4] R. Milanese, S. Gil, and T. Pun. Attentive mechanisms for dynamic and static scene analysis. Optical Engineering, 34(8):2428{2434, August 1995. [5] J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland. Watermarking digital images for copyright protection. IEE Proceedings on Vision, Image and Signal Processing, 143(4):250{256, August 1996. Invited paper, based on the paper of the same title at the IEE Conference on Image Processing and Its Applications, Edinburgh, July 1995. [6] B Ptzmann. Information hiding terminology. In Ross Anderson, editor, Proceedings of the First International Workshop in Information Hiding, Lecture Notes in Computer Science, pages 347{350, Cambridge, UK, May/June 1996. Springer Verlag. [7] J. Smith and B. Comiskey. Modulation and information hiding in images. In Ross Anderson, editor, Proceedings of the First International Workshop in Information Hiding, Lecture Notes in Computer Science, pages 207{226, Cambridge, UK, May/June 1996. Springer Verlag.