WO2002089056A1 - Watermarking with coefficient predistortion - Google Patents

Watermarking with coefficient predistortion Download PDF

Info

Publication number
WO2002089056A1
WO2002089056A1 PCT/GB2002/001845 GB0201845W WO02089056A1 WO 2002089056 A1 WO2002089056 A1 WO 2002089056A1 GB 0201845 W GB0201845 W GB 0201845W WO 02089056 A1 WO02089056 A1 WO 02089056A1
Authority
WO
WIPO (PCT)
Prior art keywords
values
image
coefficients
watermark
array
Prior art date
Application number
PCT/GB2002/001845
Other languages
French (fr)
Other versions
WO2002089056A8 (en
Inventor
David Roger Bull
Cedric Nishan Canagarajah
Dominique Winne
Henry David Knowles
Original Assignee
University Of Bristol
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University Of Bristol filed Critical University Of Bristol
Publication of WO2002089056A1 publication Critical patent/WO2002089056A1/en
Publication of WO2002089056A8 publication Critical patent/WO2002089056A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0042Fragile watermarking, e.g. so as to detect tampering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/3216Transform domain methods using Fourier transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32165Transform domain methods using cosine transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32176Transform domain methods using Walsh, Hadamard or Walsh-Hadamard transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32187Transform domain methods with selective or adaptive application of the additional information, e.g. in selected frequency coefficients
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32277Compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32331Fragile embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/48Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using compressed domain processing techniques other than decoding, e.g. modification of transform coefficients, variable length coding [VLC] data or run-length data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Abstract

The present invention provides a scheme for inserting and extracting an invisible fragile watermark in an image/video sequence, in order to verify whether a watermarked image has been tampered with. According to one aspect of the invention, there is provided a method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients with first, second and third values; and for each array determining a binary value as a watermark component bit; determining a quantization parameter, based on the separation between the first and the second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameters; and modifying the third value, such that it takes the closest one of the selected values which represents the determined watermark component bit. According to another aspect of the present invention, there is provided a method of extracting a watermark embedded in that way.

Description

WATERMARKING WITH COEFFICIENT PREDISTORTION
This invention relates to watermarking, and in particular to a system for embedding and extracting a fragile watermark in a digital object, such as a digital image .
More specifically, the invention relates to techniques for inserting and extracting fragile watermarks in an image, for the purposes of image authentication, allowing a user to determine whether and how a watermarked image has been tampered with.
A watermark is a visible or invisible structure in an image, which- can be recovered after it has been embedded. A digital watermark is a digital pattern inserted into a digital creation, such as a digital image. The process of inserting a watermark into' a digital image (embedding procedure) can be done directly in the spatial or transformed domain. The watermark can be inserted by altering certain coefficients in a way which minimises the resulting distortion of the image. The imperceptibility of the watermark is the first line of defence, since, if an image is not visibly watermarked, it is more difficult to avoid the watermark, by tampering with the image undetectably .
Most watermarking techniques fall into one of two main categories, namely,the robust type, for copyright protection, and the fragile type, for authentication applications .
Robust watermarks must be embedded in the image so that it is virtually impossible, or at least difficult, to remove the watermark without visibly damaging the image. Such a watermark must be resistant to several image-processing techniques, such as cropping, scaling, filtering, compression/decompression, etc.
Fragile watermarks are designed to detect any unauthorised alteration of the image signal. Fragile watermarks may be used, for example, in connection with images generated by digital cameras to provide a basis for determining whether or not an image has been tampered with after its creation. The requirements of a fragile watermarking system change, depending on the data type and application.
An effective authentication scheme should have some or all of the following desirable features: to be able to determine whether an image has been altered or not, and to be able to locate any alteration made on the image, even without having the original image data; "*'" ' to be able to integrate the authentication data with host image data, rather than as a separate data file; the embedded authentication data should be invisible under normal viewing conditions; to be able to extract information concerning the method of attack; to be able to restore the attacked area in the watermarked image.
US-6,064,764 proposes a fragile digital watermark embedding and extraction system where the insertion process is accomplished by embedding the bits of a digital signature of a hash function of the image in the frequency coefficients of the image. This procedure results in an imperceptible watermark, but the properties of hash functions prevent the localisation or quality assessment of the changes that have been made to the image .
EP-A2-0953938 describes an invisible digital watermark insertion technique for ownership verification and/or authentication purposes. The watermark is a combination of a given watermark bitmap and the hashed image. The extreme localisation is accomplished by embedding the digital signature in the Least Significant Bit (LSB) band of the image. However, the method cannot distinguish malicious changes from innocent image processing operations.
The paper "Digital watermarking using multiresolution wavelet decomposition" , Deepa Kundur and Dimitrios Hatzinakos, Proc . IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, Washington, May 1998, vol. 5, pp 2969-2972, discloses a robust watermarking technique.
The present invention seeks to provide a scheme for inserting and extracting an invisible fragile watermark in an image/video sequence, in order to verify whether a watermarked image has been tampered with.
According to one aspect of the invention, there is provided, a method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients with first, second and third values; and for each array: determining a binary value as a watermark component bit; f determining a quantization parameter, based on the separation between the first and second values ; selecting a plurality of values to represent ones and zeros, the separation between successive ' selected values being determined on the basis of the quantization parameter; and modifying the third value, such that it takes the closest one of the selected values which represents the determined watermark component bit . The use of a quantization parameter, which is based on the separation between the first and second values as defined above, has the advantage that the watermark can be made fragile, while minimizing the amount of distortion which is introduced.
The first and second values are preferably the extreme values of the values of the coefficients.
According to a second aspect of the present invention, there is provided a method of extracting a watermark embedded in that way.
According to a third aspect of the present invention, there' is provided method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients having two extreme values, and at least one inner value ; and for each array: determining a binary value as a watermark component bit; predistorting at least one of the extreme values of the image coefficients, if necessary, to ensure a minimum separation between the extreme values; * selecting a plurality of values between the extreme values to represent ones and zeros; and modifying the inner value, or at least one of the inner values, of the array, such that it takes the closest one of the selected values which ' represents the determined watermark component bit . The use of the predistortion step, defined above, has the advantage that the watermarking performance is improved in plain low image density areas of the image. For a better understanding of the invention, and to show how it may be put into effect, reference will now be made to the accompanying drawings .
Figure 1 is a flow chart illustrating a method of embedding a watermark, in accordance with the invention.
Figure 2 illustrates a quantization process used as part of the method of Figure 1.
Figure 3 illustrates a predistortion procedure used as part of the method of Figure 1.
Figure 4 is' a flow chart illustrating a method of extracting a watermark, in accordance with the invention.
Firstly, Figure 1 illustrates an embodiment of the invention in which a watermark is embedded in an image.
The algorithm described herein is a modification of an existing robust watermarking scheme of Kundur and Hatzinakos .
In step 101, the procedure starts with a set of image data. The image data may be in any form. For example, the image data may be a set of luminance and chrominance values associated with respective pixels of an image. The embedding of the watermark is advantageously carried put close to the source of the image. For example, the watermarking procedure can be carried out within a digital camera, for example.
The method of embedding the watermark into a digital image signal can be carried out in the spatial or transformed domain, depending on the application. Thus; step 102 shows a transformation procedure. The transformation may be of any type, and may for example involve performing a digital cosine transform (DCT) , a Fourier transform, a DFT, DST, Walsh, Hadamard, Hartley, or wavelet transform. Thus, when referring herein to coefficients, these can represent pixel values for a greyscale or coloured image, or DCT, wavelet or any transformed coefficients of the digital signal .
Next, in step 103, the coefficients of the image are divided into blocks. After watermarking, each block will contain a string of binary watermark values, and the block size represents the detection resolution. The smaller the block size, the finer the detection resolution.
In step 104, several arrays are generated inside each block. The- total number of arrays in each block will determine the number of watermark bits which can be embedded in each block. Each array contains three of the coefficients of the block, the coefficients forming each array depending on a secret key. Thus, the secret key acts as a seed number for a random number generator. The random number which is generated then controls the way in which the arrays of coefficients are formed.
The random number also provides a secret key which is used in the same way in the next block, and so on. This means that the watermark is effectively embedded in different blocks in different ways. This provides a defence against an attempt to tamper with an image by forming a collage of blocks from different images or from different parts of the same image.
The initial key, which governs the creation of the secret keys used in the respective blocks, is stored in the device in which the watermark is embedded, such that it can be retrieved only by an authorised person. .'In step 105, the watermark bit string is embedded in the selected block by modifying the values of the coefficients in each array, according to an algorithm to be described below. In steps 106 and 107, the watermarked image is obtained, by replacing the modified coefficients in their original position and then by calculating the inverse of any transform performed in step 102.
The basis of the algorithm which is used is described in the paper: "Digital watermarking using multiresolution wavelet decomposition" , by Kundur and Hatzinakos, cited above. Their technique is used for robust watermarking.
The basis of the algorithm used herein is that the available image data coefficients are divided into arrays, each array preferably comprising three coefficients, namely the smallest coefficient, fs, the middle coefficient, fm, and the largest coefficient, fx .
The range between the smallest coefficient, fs, and the largest coefficient, f1; is divided into a number of equally sized bins, and the value of the middle coefficient, fra, is modified, based on a relationship between the bins and the watermark bit which is to be embedded .
In accordance with the preferred embodiment of the present invention, the bin width δ is calculated from the values of the smallest coefficient, fg and the largest coefficient, fl r according to the following formula :
Figure imgf000009_0001
where Q is a variable that defines the number of
I bins between fx and fg.
By contrast with the prior art robust watermarking system, in the illustrated embodiment of the present invention, the value of Q is determined by the difference value (fx - fs) .
- Figure 2 illustrates the way in which the gap between the smallest and largest coefficient values is divided into bins . After sorting the three coefficients of the array into ascending order, the gap between them is divided into a number, Q, of bins, each of width δ. The value which is δ/4 from the left-hand end of each bin is then assigned to the value 0, as indicated by the dashed lines in Figure 2, while the va.lue which is 3δ/4 from the left-hand end (i.e. δ/4 from the right-hand end) of each bin is assigned to the value 1, as indicated by the solid lines in Figure 2.
Then, depending on whether the watermark bit for that array is a 0 or a 1, the value of the middle coefficient fm is modified to the closest value assigned to that bit value, that is, the closest dashed or solid line in Figure 2.
As a result,- the maximum amount of distortion which can be introduced by this modification is δ/2.
As mentioned above, the value of Q, the number of bins, is a content dependent quantization parameter. The user sets a maximum permitted modification of fm, and the value of Q is set to an integer number determined by this maximum permitted modification and by the difference between fλ and fs .
For example, if the maximum permitted modification is set to be 10, and the difference between fλ and fg is 100, then a value of Q=5 will be chosen, since, then:
10 = δ/2 = (100 / 5) /2.
The value of the quantization parameter, Q, will be increased to 6 if the difference between fx and f3 is higher than 100.
> Using a content dependent quantization parameter has the effect that, when the image data allows it, a larger value of Q, and a correspondingly smaller value of δ, can be used. This increases the fragility of the watermarking scheme, and hence its ability to detect tampering with the image, while minimizing the distortion introduced by the watermarking system.
It will be noted that this watermarking process uses three coefficients to embed one watermarking bit
(although arrays can include more than three coefficients if desired) . This allows a watermark of 21 bits to be embedded in an 8x8 block of 64 coefficients .
Thus, the watermark is embedded in the image itself rather than appended, and thus provides a more flexible and convenient tool for subsequently investigating the image integrity.
In the example described above, the range between the smallest coefficient and the largest coefficient is divided into bins, and the middle coefficient is modified. However, it is also possible to divide the range between the- middle coefficient and one of the two outer coefficients into bins, and then to extend bins of the same size so that they include the other outer coefficient, and then to modify that other outer coefficient in the same way as described above. When embedding a watermark in the wavelet transform domain, the array can be generated from the three different detail coefficients at a given position (m, n) . For example, the array of three coefficients is combined from the HL, HH and LH coefficients.
The secret key, described earlier, determines how the coefficients are grouped to form the arrays of three coefficients. In some cases, some coefficients can be used several times in different arrays. If any coefficients are to be used more than once, it is preferable that these should be very large or small coefficients, since it is only the median value coefficients that are modified.
Also, the same watermark bit could be applied to more than one array, and detected separately in each array. This technique could advantageously improve the robustness of the watermark to white Gaussian noise attack.
The watermark embedding process can be carried out by a general purpose computer, operating under the control of suitable software, or by another hardware device, such as a DSP or an ASIC, or other integrated circuit .
Figure 3 illustrates a further modification to the prior art robust watermarking scheme, in order to improve its performance in plain low image density areas, which are often difficult to watermark. By predistorting these areas, the algorithm introduces some high frequency noise in the more or less constant wavelet coefficients. This is generally unnoticeable, not least because the original image is not available to compare with- the watermarked image, and the introduced high frequency noise is spread over the whole of the plain area. This predistortion function ensures a user defined minimum difference between fx and fg/ before embedding the binary watermark value.
Thus, the process of Figure 3 can be carried out as an initial part of step 105 of Figure 1.
The predistortion procedure starts at step 301, and, in step 302 a counter i is initialised and a user defined minimum difference value, min_diff, is set, in this case to an exemplary value of 10.
In step 303, it is determined whether a predistortion is necessary, that is, whether the difference between fx and fs is less than the user defined minimum difference value. If it is not, no predistortion is necessary, and the process ends (step 304) .
If it is determined that predistortion is required, this is calculated in a loop of steps 305 and 306, and then, in step 307, the largest coefficient, fx, is increased by an amount sufficient to make fx equal to fg plus the preset minimum difference value. For instance, if the difference between fλ and fs is 6 then the value of fλ is increased by 4 to achieve the minimum difference of 10. The predistortion procedure then ends, and the process returns to step 105 in the watermarking procedure .
Figure 4 illustrates the watermarking extraction procedure, as carried out in a detector. For example, the detection procedure can be performed in a suitably programmed device.
The procedure starts at step 401, and, in step 402, calculates the coefficients of the image with the necessary transform and initialises a counter value i .
In step 403, if several arrays contained one watermark bit -to. -improve the robustness of the watermark as described earlier, the coefficients are divided in blocks. The detected watermark bit can then be obtained from a weighted estimation of the results obtained from different arrays, as described in more detail below.
In step 404, the arrays containing the three coefficients are formed. This is controlled by a secret key function, which uniquely creates the correct arrays, using the same secret key used in the watermark embedding process. Thus, it is necessary to retrieve the key that was used in the watermark insertion process, in order to be able to determine the grouping of the coefficient arrays, and in order to extract the embedded watermark.
Thus, the secret key function controls the security of the authentication process even if the embedding and extraction algorithms are publicly known.
The following steps apply to each array.
In step 405, the given array is sorted in ascending order and the quantization parameter Q is'' extracted from the difference between fx and fa. Then the bin size δ is calculated using the formula given previously. Once fs and δ are known, the detected watermark binary value can be extracted from the position of fm relative to fx and fs . Specifically:
Steps 407 and 406 are looped by incrementing the counter i to locate the bin in which fra lies, namely the value of i which allows: fm e [f3 + (i-l)δ , f3 + i.δ]
Then, by comparison of the relative position of fm inside that interval, we obtain the extracted watermark value .
Thus, as set out in steps 408, 409 and 410 of Figure 4, if: fm -(fg + (i-l)δ) < (f3 + i.δ)-fm , then W = 0, otherwise,..W. = 1.
Thus, step 408 determines the relative position of fm and pinpoints the extracted binary value for this array.
This extraction process is repeated for all of the arrays of three coefficients, until all of the embedded bits have been extracted. The extracted bits then represent the extracted watermark, unless the arrays were grouped together to carry the same bit .
If multiple arrays carry the same bit, a weighted decision determines the extracted watermark bit value.
In that case, the process for extraction of the watermark bit is as described above, except that, instead of the thresholding step 408, a value v (where 0 ≤ v ≤ 1) is determined, based on the position of fra, relative to the nearest value which is assigned to the value 0 and the nearest value which is assigned to the value 1.
For example, if the determined position of fm is equidistant between the nearest value which is assigned to the value 0 and the nearest value which is assigned to the value 1, then a value v of 0.5 is determined. To illustrate the result of this process, if a watermark bit was embedded in three arrays, and the three coefficients extracted from these arrays give values of v, based on their relative positions as described above, of: 0.6, 0.6 and 0.1, then a weighted decision results in an extracted value of 0. Thus: round( (0.6+0.6+0.1) /3) - 0.
By contrast, following the process as shown exactly in Figure 4, and then taking the average of the extracted (separately rounded) bits is a 1:- round(0.6) - 1 round (0.6) - 1 round (0.1) - 0 average = 1.
After the extraction process, the extracted watermark bit values can be compared with the originally embedded watermark. This comparison locates any tampered area, if the extracted bit does not match the embedded bit on the given position.
The location of the array which includes the non- matching bit indicates the tampered region of the image. Since it is advantageous to be able to locate the illegally tampered area precisely, the detection resolution should preferably be as high as possible.
The watermark can be embedded in the secret key information or standard built in the detector, as the watermark is not the most important factor of the detector.
The watermark extraction and comparison process can be carried out by a general purpose computer, operating under the control of suitable software, or by another hardware device, such as a DSP or an ASIC, or other integrated circuit .
. The correct formation of the arrays of coefficients plays an important role in the detection process .
If a watermarked image is resized or cropped, then the extraction procedure will also return an output that indicates that the whole image was changed. This would result in a random detector output if the watermarked image is resized or cropped.
For colour images, the watermark can be embedded in every plane or just a specific plane.
In the case of a video sequence, each frame or just some selected frames, e.g.: I-frames, can be watermarked, depending on the application and the ability to detect attacks which involve frame reordering and frame removal .
This fragile watermarking scheme can be used in combination with; a robust watermark algorithm to form a hybrid watermark system. The hybrid watermark can then be used to pinpoint changes accurately, as well as to distinguish malicious tampering from innocent operations .

Claims

1. A method of watermarking a digital image, comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients with first, second and third values; and for each array: determining a binary value as a watermark component-,>,bit ; determining a quantization parameter, based on the separation between the first and second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameter; and modifying the third value, such that it takes the closest one of the selected values which represents the determined watermark component bit.
2. A method as claimed in claim 1, wherein the quantization parameter is determined on the basis of a preset maximum separation of the selected values.
3. A method as claimed in claim 2, wherein the preset maximum separation of the selected values is user selectable.
4. A method as claimed in claim 1, 2 or 3, wherein the first and second values are the smallest and the largest values of coefficients in the array.
.
5. A method as claimed in any preceding claim, wherein the image coefficients comprise transform coefficients .
6. A method as claimed in any preceding claim, wherein the image coefficients comprise bit values.
7. A computer system, programmed to carry out a method as claimed in any one of claims 1 to .
8. A hardware device, adapted to carry out a method as claimed in any one of claims 1 to 6.
9. An image generation device, comprising: means for generating a digital image; and means for carrying out a method as claimed in any one of claims 1 to 6.
10. A computer software product, containing code for carrying out a method as claimed in any one of claims 1 to 6.
11. A method of detecting a watermark in a digital image, the method comprising: obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients comprising coefficients having first, second and third values; and for each array: determining a binary value as an actual watermark component bit; determining a quantization parameter, based on the separation between the first and second values; selecting a plurality of values to represent ones and zeros, the separation between successive selected values being determined on the basis of the quantization parameter; and determining which of the selected values is closest to the third value; determining a detected watermark component bit, based on whether the closest one of the selected values to the third value represents a one or a zero; and comparing the detected watermark component bit and the actual watermark component bit .
12. A method as claimed in claim 11, further comprising : displaying said digital image, distinguishing between regions of the image in which the detected watermark component bit matches the actual watermark component bit, and regions of the image in which the detected watermark component bit does not match the actual watermark component bit .
13. A method as claimed in claim 11 or 12, wherein the digital image is a frame of a video sequence . ^--- - '
14. A computer system, programmed to carry out a method as claimed in any one of claims 11 to 12.
15. A hardware device, adapted to carry out a method as claimed in any one of claims 11 to 12.
16. A computer software product, containing code for carrying out a method as claimed in any one of claims 11 to 12.
17. A method of watermarking a digital image, comprising : obtaining digital image coefficients; forming a plurality of arrays of image coefficients, each array comprising a predetermined number of image coefficients, the image coefficients having two extreme values, and at least one inner value ; and for each array: determining a binary value as a watermark component bit; predistorting at least one of the extreme -'values of the image coefficients, if necessary, to ensure a minimum separation between the extreme values ; selecting a plurality of values between the extreme values to represent ones and zeros; and modifying the inner value, or at least one of the inner values, of the array, such that it takes the closest one of the selected values which represents the determined watermark component bit .
18. A method as claimed in claim 17, wherein the number of selected values, and the separation between successive selected values, are determined on the basis of the separation between the extreme values, and on the basis of a preset maximum separation of the selected values.
19. A method as claimed in claim 18, wherein the preset maximum*, separation of the selected values is user selectable.
20. A method as claimed in claim 17, 18 or 19, wherein each array comprises three image' coefficients.
21. A method as claimed in any of claims 17-20, wherein the image coefficients comprise transform coefficients .
22. A method as claimed in any of claims 17-21, wherein the image coefficients comprise bit values.
23. A computer system, programmed to carry out a method as claimed in any one of claims 17 to 22.
24. A hardware device, adapted to carry out a method as claimed in any one of claims 17 to 22.
25. An image generation device, comprising: means for generating a digital image; and means for carrying out a method as claimed in any one of claims 17 to 22.
26. A computer software product, containing code for carrying out a method as claimed in any one of claims 17 to 22.
PCT/GB2002/001845 2001-04-25 2002-04-23 Watermarking with coefficient predistortion WO2002089056A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0110151A GB2374996A (en) 2001-04-25 2001-04-25 Watermarking with predistortion
GB0110151.8 2001-04-25

Publications (2)

Publication Number Publication Date
WO2002089056A1 true WO2002089056A1 (en) 2002-11-07
WO2002089056A8 WO2002089056A8 (en) 2003-03-13

Family

ID=9913444

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2002/001845 WO2002089056A1 (en) 2001-04-25 2002-04-23 Watermarking with coefficient predistortion

Country Status (2)

Country Link
GB (1) GB2374996A (en)
WO (1) WO2002089056A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7006662B2 (en) 2001-12-13 2006-02-28 Digimarc Corporation Reversible watermarking using expansion, rate control and iterative embedding
US7187780B2 (en) 2001-12-13 2007-03-06 Digimarc Corporation Image processing methods using reversible watermarking
US7376242B2 (en) 2001-03-22 2008-05-20 Digimarc Corporation Quantization-based data embedding in mapped data
US7515730B2 (en) 2001-12-13 2009-04-07 Digimarc Corporation Progressive image quality control using watermarking
US7561714B2 (en) 2001-12-13 2009-07-14 Digimarc Corporation Reversible watermarking
US8050452B2 (en) 2001-03-22 2011-11-01 Digimarc Corporation Quantization-based data embedding in mapped data
US8059815B2 (en) 2001-12-13 2011-11-15 Digimarc Corporation Transforming data files into logical storage units for auxiliary data through reversible watermarks
US8477990B2 (en) 2010-03-05 2013-07-02 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
WO2013141489A1 (en) * 2012-03-22 2013-09-26 Samsung Electronics Co., Ltd. Method and apparatus for embedding and detecting watermark
US8971567B2 (en) 2010-03-05 2015-03-03 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US9349153B2 (en) 2007-04-25 2016-05-24 Digimarc Corporation Correcting image capture distortion
US10664940B2 (en) 2010-03-05 2020-05-26 Digimarc Corporation Signal encoding to reduce perceptibility of changes over time
CN117057971A (en) * 2023-10-07 2023-11-14 湖北微模式科技发展有限公司 JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0984616A2 (en) * 1998-09-04 2000-03-08 Nippon Telegraph and Telephone Corporation Method and apparatus for digital watermarking

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1028585A1 (en) * 1999-01-21 2000-08-16 Nec Corporation A method for inserting and detecting electronic watermark data into a digital image and a device for the same
GB2348071B (en) * 1999-03-18 2003-11-05 British Broadcasting Corp Watermarking

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0984616A2 (en) * 1998-09-04 2000-03-08 Nippon Telegraph and Telephone Corporation Method and apparatus for digital watermarking

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KUNDUR D ET AL: "DIGITAL WATERMARKING FOR TELLTALE TAMPER PROOFING AND AUTHENTICATION", PROCEEDINGS OF THE IEEE, IEEE. NEW YORK, US, vol. 87, no. 7, July 1999 (1999-07-01), pages 1167 - 1180, XP000914459, ISSN: 0018-9219 *
KUNDUR D ET AL: "Digital watermarking using multiresolution wavelet decomposition", ACOUSTICS, SPEECH AND SIGNAL PROCESSING, 1998. PROCEEDINGS OF THE 1998 IEEE INTERNATIONAL CONFERENCE ON SEATTLE, WA, USA 12-15 MAY 1998, NEW YORK, NY, USA,IEEE, US, 12 May 1998 (1998-05-12), pages 2969 - 2972, XP010279459, ISBN: 0-7803-4428-6 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7769202B2 (en) 2001-03-22 2010-08-03 Digimarc Corporation Quantization-based data embedding in mapped data
US8050452B2 (en) 2001-03-22 2011-11-01 Digimarc Corporation Quantization-based data embedding in mapped data
US7376242B2 (en) 2001-03-22 2008-05-20 Digimarc Corporation Quantization-based data embedding in mapped data
US8194917B2 (en) 2001-12-13 2012-06-05 Digimarc Corporation Progressive image quality control using watermarking
US7561714B2 (en) 2001-12-13 2009-07-14 Digimarc Corporation Reversible watermarking
US7599518B2 (en) 2001-12-13 2009-10-06 Digimarc Corporation Reversible watermarking using expansion, rate control and iterative embedding
US7515730B2 (en) 2001-12-13 2009-04-07 Digimarc Corporation Progressive image quality control using watermarking
US8019116B2 (en) 2001-12-13 2011-09-13 Digimarc Corporation Content processing methods using reversible watermarking
US7187780B2 (en) 2001-12-13 2007-03-06 Digimarc Corporation Image processing methods using reversible watermarking
US8059815B2 (en) 2001-12-13 2011-11-15 Digimarc Corporation Transforming data files into logical storage units for auxiliary data through reversible watermarks
US7006662B2 (en) 2001-12-13 2006-02-28 Digimarc Corporation Reversible watermarking using expansion, rate control and iterative embedding
US9349153B2 (en) 2007-04-25 2016-05-24 Digimarc Corporation Correcting image capture distortion
US8873797B2 (en) 2010-03-05 2014-10-28 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US8971567B2 (en) 2010-03-05 2015-03-03 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US9311687B2 (en) 2010-03-05 2016-04-12 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US8477990B2 (en) 2010-03-05 2013-07-02 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
US9710870B2 (en) 2010-03-05 2017-07-18 Digimarc Corporation Extending watermark detection distortion tolerances
US10176545B2 (en) 2010-03-05 2019-01-08 Digimarc Corporation Signal encoding to reduce perceptibility of changes over time
US10664940B2 (en) 2010-03-05 2020-05-26 Digimarc Corporation Signal encoding to reduce perceptibility of changes over time
WO2013141489A1 (en) * 2012-03-22 2013-09-26 Samsung Electronics Co., Ltd. Method and apparatus for embedding and detecting watermark
CN117057971A (en) * 2023-10-07 2023-11-14 湖北微模式科技发展有限公司 JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration
CN117057971B (en) * 2023-10-07 2023-12-29 湖北微模式科技发展有限公司 JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration

Also Published As

Publication number Publication date
GB0110151D0 (en) 2001-06-20
GB2374996A (en) 2002-10-30
WO2002089056A8 (en) 2003-03-13

Similar Documents

Publication Publication Date Title
US6101602A (en) Digital watermarking by adding random, smooth patterns
Fridrich Methods for tamper detection in digital images
Fridrich Robust bit extraction from images
Lin et al. Detection of image alterations using semifragile watermarks
Voyatzis et al. Chaotic watermarks for embedding in the spatial digital image domain
Fridrich Visual hash for oblivious watermarking
Fridrich et al. Robust digital watermarking based on key-dependent basis functions
US20060020830A1 (en) Localisation of image tampering
WO2002089056A1 (en) Watermarking with coefficient predistortion
Winne et al. Digital watermarking in wavelet domain with predistortion for authenticity verification and localization
Guo et al. Multi-resolution image watermarking scheme in the spectrum domain
JP6937012B2 (en) Digital watermarking device and method
Egorova et al. Semi-fragile watermarking for jpeg image authentication: A comparative study
Tang et al. Image authentication using relation measures of wavelet coefficients
Premaratne et al. 2D barcodes as watermarks in image authentication
WO2002089057A1 (en) Watermarking using representative values
Luo et al. JPEG domain watermarking
Roberts Security camera video authentication
Soheili Redundant watermarking using wavelet packets
Kitanovski et al. Watermark generation using image-dependent key for image authentication
Rakhmawati et al. Review of some existing work for self-recovery fragile watermarking algorithms
Al-Mualla Content-adaptive semi-fragile watermarking for image authentication
Winne et al. Compression-compatible digital watermark algorithm for authenticity verification and localization
Phadikar et al. Region Specific Spatial Domain Image Watermnarking Scheme
KR100343604B1 (en) Method for Inserting Object-based Digital Watermark Using Shuffling Technique

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: C1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP