Secure spread spectrum watermarking for multimedia
更新时间:2023-04-06 22:02:01 阅读量: 教育文库 文档下载
- secure推荐度:
- 相关推荐
IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER19971673
Secure Spread Spectrum
Watermarking for Multimedia Ingemar J.Cox,Senior Member,IEEE,Joe Kilian,F.Thomson Leighton,and Talal Shamoon,Member,IEEE
Abstract—This paper presents a secure(tamper-resistant)al-gorithm for watermarking images,and a methodology for digital watermarking that may be generalized to audio,video,and multimedia data.We advocate that a watermark should be constructed as an independent and identically distributed(i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most signi?-cant spectral components of the data.We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations(such as lossy compression,?ltering, digital-analog and analog-digital conversion,requantization,etc.), and common geometric transformations(such as cropping,scal-ing,translation,and rotation)provided that the original image is available and that it can be succesfully registered against the transformed watermarked image.In these cases,the watermark detector unambiguously identi?es the owner.Further,the use of Gaussian noise,ensures strong resilience to multiple-document,or collusional,attacks.Experimental results are provided to support these claims,along with an exposition of pending open problems. Index Terms—Intellectual property,?ngerprinting,multime-dia,security,steganography,watermarking.
I.I NTRODUCTION
T HE PROLIFERATION of digitized media(audio,image, and video)is creating a pressing need for copyright enforcement schemes that protect copyright ownership.Con-ventional cryptographic systems permit only valid keyholders access to encrypted data,but once such data is decrypted there is no way to track its reproduction or retransmission. Therefore,conventional cryptography provides little protection against data piracy,in which a publisher is confronted with unauthorized reproduction of information.A digital watermark is intended to complement cryptographic processes.It is a visible,or preferably invisible,identi?cation code that is permanently embedded in the data and remains present within
Manuscript received January14,1996;revised January24,1997.Portions of this work were reprinted,with permission,from the Proceedings of the IEEE Conference on Image Processing,1996,and from the Proceedings of the First International Conference on Data Hiding(Springer-Verlag,1996). The associate editor coordinating the reivew of this manuscript and approving it for publication was Prof.Sarah Rajala.
I.J.Cox and J.Kilian are with NEC Research Institute,Princeton,NJ08540 USA(e-mail:ingemar@4ef08e7301f69e31433294ff;joe@4ef08e7301f69e31433294ff).
F.T.Leighton is with the Mathematics Department and Laboratory for Computer Science,The Massachusetts Institute of Technology,Cambridge, MA02139USA(e-mail:ftl@4ef08e7301f69e31433294ff).
T.Shamoon is with InterTrust STAR Laboratory,Sunnyvale,CA94086 USA(e-mail:talal@4ef08e7301f69e31433294ff).
Publisher Item Identi?er S1057-7149(97)08460-1.the data after any decryption process.In the context of this work,data refers to audio(speech and music),images (photographs and graphics),and video(movies).It does not include ASCII representations of text,but does include text represented as an image.Many of the properties of the scheme presented in this work may be adapted to accommodate audio and video implementations,but the algorithms here speci?cally apply to images.
A simple example of a digital watermark would be a visible“seal”placed over an image to identify the copyright owner(e.g.,[2]).A visible watermark is limited in many ways.It marrs the image?delity and is susceptible to attack through direct image processing.A watermark may contain additional information,including the identity of the purchaser of a particular copy of the material.In order to be effective,a watermark should have the characteristics outlined below. Unobtrusiveness:The watermark should be perceptually invisible,or its presence should not interfere with the work being protected.
Robustness:The watermark must be dif?cult(hopefully impossible)to remove.If only partial knowledge is available (for example,the exact location of the watermark in an image is unknown),then attempts to remove or destroy a watermark should result in severe degradation in?delity before the watermark is lost.In particular,the watermark should be robust in the following areas.
?Common signal processing:The watermark should still be retrievable even if common signal processing oper-ations are applied to the data.These include,digital-to-analog and analog-to-digital conversion,resampling, requantization(including dithering and recompression), and common signal enhancements to image contrast and color,or audio bass and treble,for example.?Common geometric distortions(image and video data): Watermarks in image and video data should also be im-mune from geometric image operations such as rotation, translation,cropping and scaling.
?Subterfuge attacks(collusion and forgery):In addition, the watermark should be robust to collusion by multiple inpiduals who each possess a watermarked copy of the data.That is,the watermark should be robust to combining copies of the same data set to destroy the watermarks.Further,if a digital watermark is to be used in litigation,it must be impossible for colluders to combine their images to generate a different valid watermark with the intention of framing a third party.
1057–7149/97$10.00?1997IEEE
1674IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER1997
Universality:The same digital watermarking algorithm should apply to all three media under consideration.This is potentially helpful in the watermarking of multimedia products.Also,this feature is conducive to implementation of audio and image/video watermarking algorithms on common hardware.
Unambiguousness:Retrieval of the watermark should un-ambiguously identify the owner.Furthermore,the accuracy of owner identi?cation should degrade gracefully in the face of attack.
There are two parts to building a strong watermark:the watermark structure and the insertion strategy.In order for a watermark to be robust and secure,these two components must be designed correctly.We provide two key insights that make our watermark both robust and secure:We argue that the watermark be placed explicitly in the perceptually most signi?cant components of the data,and that the watermark be composed of random numbers drawn from a Gaussian distribution.
The stipulation that the watermark be placed in the per-ceptually signi?cant components means that an attacker must target the fundamental structural components of the data, thereby heightening the chances of?delity degradation.While this strategy may seem counterintuitive from the point of view of steganography(how can these components hide any signal?),we discovered that the signi?cant components have a perceptual capacity that allows watermark insertion without perceptual degradation.Further,most processing techniques applied to media data tend to leave the perceptually signi?cant components intact.While one may choose from a variety of such components,in this paper,we focus on the perceptually signi?cant spectral components of the data.This simultane-ously yields high perceptual capacity and achieves a uniform spread of watermark energy in the pixel domain.
The principle underlying our watermark structuring strategy is that the mark be constructed from independent,identically distributed(i.i.d.)samples drawn from a Gaussian distribu-tion.Once the signi?cant components are located,Gaussian noise is injected therein.The choice of this distribution gives resilient performance against collusion attacks.The Gaussian watermark also gives our scheme strong performance in the face of quantization,and may be structured to provide low false positive and false negative detection.This is discussed below,and elaborated on in[13].
Finally,note that the techniques presented herein do not provide proof of content ownership on their own.The focus of this paper are algorithms that insert messages into content in an extremely secure and robust fashion.Nothing prevents someone from inserting another message and claiming owner-ship.However,it is possible to couple our methods with strong authentication and other cryptographic techniques in order to provide complete,secure and robust owner identi?cation and authentication.
Section III begins with a discussion of how common sig-nal transformations,such as compression,quantization,and manipulation,affect the frequency spectrum of a signal.This discussion motivates our belief that a watermark should be embedded in the data’s perceptually signi?cant frequency components.Of course,the major problem then becomes how to imperceptibly insert a watermark into perceptually signi?cant components of the frequency spectrum.Section III-A proposes a solution based on ideas from spread spectrum communications.In particular,we present a watermarking algorithm that relies on the use of the original image to extract the watermark.Section IV provides an analysis based on pos-sible collusion attacks that indicates that a binary watermark is not as robust as a continuous one.Furthermore,we show that a watermark structure based on sampling drawn from multiple i.i.d Gaussian random variables offers good protection against collusion.Ultimately,no watermarking system can be made perfect.For example,a watermark placed in a textual image may be eliminated by using optical character recogni-tion technology.However,for common signal and geometric distortions,the experimental results of Section V suggest that our system satis?es most of the properties discussed in the introduction,and displays strong immunity to a variety of attacks in a collusion resistant manner.Finally,Section VI discusses possible weaknesses and potential enhancements to the system and describes open problems and subsequent work.
II.P REVIOUS W ORK
Several previous digital watermarking methods have been proposed.Turner[25]proposed a method for inserting an identi?cation string into a digital audio signal by substituting the“insigni?cant”bits of randomly selected audio samples with the bits of an identi?cation code.Bits are deemed “insigni?cant”if their alteration is inaudible.Such a system is also appropriate for two-dimensional(2-D)data such as images,as discussed in[26].Unfortunately,Turner’s method may easily be circumvented.For example,if it is known that the algorithm only affects the least signi?cant two bits of a word,then it is possible to randomly?ip all such bits,thereby destroying any existing identi?cation code.
Caronni[6]suggests adding tags—small geometric pat-terns—to digitized images at brightness levels that are imper-ceptible.While the idea of hiding a spatial watermark in an image is fundamentally sound,this scheme may be susceptible to attack by?ltering and redigitization.The fainter such watermarks are,the more susceptible they are such attacks and geometric shapes provide only a limited alphabet with which to encode information.Moreover,the scheme is not applicable to audio data and may not be robust to common geometric distortions,especially cropping.
Brassil et al.[4]propose three methods appropriate for document images in which text is common.Digital watermarks are coded by1)vertically shifting text lines,2)horizontally shifting words,or3)altering text features such as the vertical endlines of inpidual characters.Unfortunately,all three proposals are easily defeated,as discussed by the authors. Moreover,these techniques are restricted exclusively to images containing text.
Tanaka et al.[19],[24]describe several watermarking schemes that rely on embedding watermarks that resemble quantization noise.Their ideas hinge on the notion that quan-tization noise is typically imperceptible to viewers.Their
COX et al.:SPREAD SPECTRUM WATERMARKING 1675
?rst scheme injects a watermark into an image by using a predetermined data stream to guide level selection in a predictive quantizer.The data stream is chosen so that the resulting image looks like quantization noise.A variation on this scheme is also presented,where a watermark in the form of a dithering matrix is used to dither an image in a certain way.There are several drawbacks to these schemes.The most important is that they are susceptible to signal processing,especially requantization,and geometric attacks such as cropping.Furthermore,they degrade an image in the same way that predictive coding and dithering can.
In [24],the authors also propose a scheme for watermarking facsimile data.This scheme shortens or lengthens certain runs of data in the run length code used to generate the coded fax image.This proposal is susceptible to digital-to-analog and analog-to-digital attacks.In particular,randomizing the least signi?cant bit (LSB)of each pixel’s intensity will completely alter the resulting run length encoding.Tanaka et al.also propose a watermarking method for “color-scaled picture and video sequences”.This method applies the same signal transform as the Joint Photographers Expert Group (JPEG)(discrete cosine transform of
8
pairs of image points,,and increases the
brightness
at by one unit while correspondingly decreasing the brightness
of
pairs of points is
then
bits with the
LSB of each pixel.If the LSB is equal to the corresponding mask bit,then the random quantity is added,otherwise it is subtracted.The watermark is subtracted by ?rst computing the difference between the original and watermarked images
and then by examining the sign of the difference,pixel by pixel,to determine if it corresponds to the original sequence of additions and subtractions.This method does not make use of perceptual relevance,but it is proposed that the high frequency noise be pre?ltered to provide some robustness to lowpass ?ltering.This scheme does not consider the problem of collusion attacks.
Koch,Rindfrey,and Zhao [14]propose two general methods for watermarking images.The ?rst method,attributed to Scott Burgett,breaks up an image into
8
8DCT block.The choice of
the eight frequencies to be altered within the DCT block is based on a belief that the “middle frequencies...have moderate variance,”i.e.they have similar magnitude.This property is needed in order to allow the relative strength of the frequency triples to be altered without requiring a modi?cation that would be perceptually noticeable.Super?cially,this scheme is similar to our own proposal,also drawing an analogy to spread spectrum communications.However,the structure of their watermark is different from ours,and the set of frequencies is not chosen based on any direct perceptual signi?cance,or relative energy considerations.Further,because the variance between the eight frequency coef?cients is small,one would expect that their technique may be sensitive to noise or distortions.This is supported by the experimental results that report that the “embedded labels are robust against JPEG compression for a quality factor as low as about 50%.”By comparison,we demonstrate that our method performs well with compression quality factors as low as 5%.An earlier proposal by Koch and Zhao [15]used not triples of frequencies but pairs of frequencies,and was again designed speci?cally for robustness to JPEG compression.Nevertheless,they state that “a lower quality factor will increase the likelihood that the changes necessary to superimpose the embedded code on the signal will be noticeably visible.”In a second method,designed for black and white images,no frequency transform is employed.Instead,the selected blocks are modi?ed so that the relative frequency of white and black pixels encodes the ?nal value.Both watermarking procedures are particularly vulnerable to multiple document attacks.To protect against this,Zhao and Koch propose a distributed
8
,for example)that
are selected based on the binary digit to be transmitted.Thus,
1676IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER1997 Adelson’s method is equivalent to watermark schemes that
encode information into the LSB’s of the data or its transform
coef?cients.Adelson recognizes that the method is susceptible
to noise and therefore proposes an alternative scheme wherein
a2
l e v e l s a n d t h e h i g h f r e q u e n c y c o e f?c i e n t s,
COX et al.:SPREAD SPECTRUM WATERMARKING1677
be immune to intentional manipulation by malicious parties. These manipulations can include combinations of the above distortions,and can also include collusion and forgery attacks, which are discussed in Section IV-E.
A.Spread Spectrum Coding of a Watermark
The above discussion illustrates that the watermark should not be placed in perceptually insigni?cant regions of the image (or its spectrum),since many common signal and geometric processes affect these components.For example,a watermark placed in the high-frequency spectrum of an image can be easily eliminated with little degradation to the image by any process that directly or indirectly performs lowpass?ltering. The problem then becomes how to insert a watermark into the most perceptually signi?cant regions of the spectrum in a?delity preserving fashion.Clearly,any spectral coef?cient may be altered,provided such modi?cation is small.However, very small changes are very susceptible to noise.
To solve this problem,the frequency domain of the image or sound at hand is viewed as a communication channel, and correspondingly,the watermark is viewed as a signal that is transmitted through it.Attacks and unintentional signal distortions are thus treated as noise that the immersed signal must be immune to.While we use this methodology to hide watermarks in data,the same rationale can be applied to sending any type of message through media data.
We originally conceived our approach by analogy to spread spectrum communications[20].In spread spectrum commu-nications,one transmits a narrowband signal over a much larger bandwidth such that the signal energy present in any single frequency is undetectable.Similarly,the watermark is spread over very many frequency bins so that the energy in any one bin is very small and certainly undetectable.Nevertheless, because the watermark veri?cation process knows the location and content of the watermark,it is possible to concentrate these many weak signals into a single output with high signal-to-noise ratio(SNR).However,to destroy such a watermark would require noise of high amplitude to be added to all frequency bins.
Spreading the watermark throughout the spectrum of an image ensures a large measure of security against unintentional or intentional attack:First,the location of the watermark is not obvious.Furthermore,frequency regions should be selected in a fashion that ensures severe degradation of the original data following any attack on the watermark.
A watermark that is well placed in the frequency domain of an image or a sound track will be practically impossible to see or hear.This will always be the case if the energy in the watermark is suf?ciently small in any single frequency coef?cient.Moreover,it is possible to increase the energy present in particular frequencies by exploiting knowledge of masking phenomena in the human auditory and visual systems. Perceptual masking refers to any situation where information in certain regions of an image or a sound is occluded by perceptually more prominent information in another part of the scene.In digital waveform coding,this frequency domain (and,in some cases,time/pixel domain)masking is
exploited
Fig.2.Stages of watermark insertion process. extensively to achieve low bit rate encoding of data[9],[12].It is known that both the auditory and visual systems attach more resolution to the high-energy,low-frequency,spectral regions of an auditory or visual scene[12].Further,spectrum analysis of images and sounds reveals that most of the information in such data is located in the low-frequency regions.
Fig.2illustrates the general procedure for frequency domain watermarking.Upon applying a frequency transformation to the data,a perceptual mask is computed that highlights per-ceptually signi?cant regions in the spectrum that can support the watermark without affecting perceptual?delity.The wa-termark signal is then inserted into these regions in a manner described in Section IV-B.The precise magnitude of each modi?cation is only known to the owner.By contrast,an attacker may only have knowledge of the possible range of modi?cation.To be con?dent of eliminating a watermark,an attacker must assume that each modi?cation was at the limit of this range,despite the fact that few such modi?cations are typically this large.As a result,an attack creates visible(or audible)defects in the data.Similarly,unintentional signal distortions due to compression or image manipulation,must leave the perceptually signi?cant spectral components intact, otherwise the resulting image will be severely degraded.This is why the watermark is robust.
In principle,any frequency domain transform can be used. However,in the experimental results of Section VI we use a Fourier domain method based on the DCT[16],although we are currently exploring the use of wavelet-based schemes as a variation.In our view,each coef?cient in the frequency domain has a perceptual capacity,that is,a quantity of additional
1678IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER 1997
information can be added without any (or with minimal)impact to the perceptual ?delity of the data.To determine the perceptual capacity of each frequency,one can use models for the appropriate perceptual system or simple experimentation.In practice,in order to place a
length
image,we computed
the DCT of the image and
placed the watermark into
the
.In practice,we create a watermark where each
value is chosen independently
according
to
denotes a normal
distribution with
mean
a sequence of
values
to obtain an adjusted sequence of
values
.to
obtain a watermarked
document
and
for statistical signi?cance.We
extract
)and then
generating
.
Frequency-domain based methods for
extracting and
inserting
into
,which determines the extent to
which
.Three natural formulae for
computing
(2)
,which holds in all of our experiments.
Given
.
Equation (1)may not be appropriate when
the values vary widely.
If
adding 100will distort
this value unacceptably.Insertion based on (2)or (3)are more robust against such differences in scale.We note that (2)and (3)give similar results
when
may not be applicable for perturbing
all of the
values ,since different spectral components may exhibit more or less tolerance to modi?cation.More generally one can have multiple scaling
parameters
COX et al.:SPREAD SPECTRUM WATERMARKING 1679
can perceptually “get away”with
altering by a large factor without degrading the document.
There remains the problem of selecting the multiple scaling values.In some cases,the choice
of may be based on some general assumption.For example,(2)is a special case of the generalized
(1)
,extract the corresponding
values
whenever
.One way to combine this constraint with the empirical approach would be to
set according
to
.When we computed JPEG-based distortions
of the original image,we observed that the higher energy frequency components were not altered proportional to their magnitude [the implicit assumption of (2)].We suspect that we could make a less obtrusive mark of equal strength by attenuating our alterations of the high-energy components and amplifying our alterations of the lower energy components.However,we have not yet performed this experiment.C.Choosing the
Length,
dictates the degree to which the watermark
is spread out among the relevant components of the image.In general,as the number of altered components are increased the extent to which they must be altered decreases.For a more quantitative assessment of this tradeoff,we consider watermarks of the
form
where are chosen according
to independent normal distributions with standard
deviation
is proportional
to
.Even the act of
requantizing the watermarked document for delivery will
cause
.We measure the similarity
of
by
sim
(4)
Many other measures are possible,including the standard correlation coef?cient.Further variations on this basic metric are discussed in IV-D2.To decide
whether match,one determines whether
sim ,
where
and
(either
through the seller or through a watermarked document).Then,even conditioned on any ?xed value
for
is
independent
of
is a 4ef08e7301f69e31433294ffing the well-known
formula for the distribution of a linear combination of variables that are independent and normally
distributed,will be distributed according
to
is distributed according
to
then the probability that
sim
equal to six will cause spurious matchings to
be extremely rare.Of course,the number of tests to be performed must be considered in determining what false positive probability is acceptable.For example,if one tests an extracted watermark watermarks,then the probability of a false positive is increased by a multiplicative factor of 10
,the size of the
watermark.
However,
is generated
in the prescribed manner.As a rule of thumb,larger values
of
and
),
1680IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER
1997Fig.4.Bavarian couple image courtesy of Corel Stock Photo Library.
without causing larger similarity values
when
are independent.This bene?t must be balanced against the
tendency for the document to be more distorted
when
is generated with only ?nite pre-
cisions.However,this effect is caused only by the arithmetic
precision,and not on the constraints imposed by the document.
If
each is stored as a double-precision real number,the
difference between the calculated value of sim and its
“ideal”value will be quite small for any
reasonable
from
,
denoted
,differed substantially from zero,due to the effects
of a dithering procedure.While this artifact could be easily
eliminated as part of the extraction process,it provides a
motivation for postprocessing extracted watermarks.We found
that the simple
transformation yielded
superior values of sim .The improved performance
resulted from the decreased value
of
could
be greatly distorted for some values
of if
tolerance Again,the goal of such a transformation is to
lower
or
COX et al.:SPREAD SPECTRUM WATERMARKING
1681
(a)(b)
Fig.7.(a)Lowpass ?ltered,0.5scaled image of Bavarian couple.(b)Rescaled image showing noticeable loss of ?ne detail.
procedure for
extracting
and
multiple wa-termarked
copies
to produce an unwatermarked
document th
watermark is the same for
all
is generated by
either
adding
at random
to .Then as soon as one ?nds two documents with unequal values
for
documents one can,on average,
eliminate all but
a
,
where
as determin-ing a ?delity/undetectability tradeoff curve and the value
of
by a linear update rule,then
an averaging attack,which
sets
will result
in
will be
roughly
will be
1682IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER
1997
Fig.8.JPEG encoded version of Bavarian couple with 10%quality and 0%smoothing.
roughly .Thus,the similarity measure can be shrunk by
a factor of
reduction in the similarity measure.V.E XPERIMENTAL R ESULTS
In order to evaluate the proposed watermarking scheme,we took the Bavarian couple 2image of Fig.4and produced the watermarked version of Fig.5.We then subjected the watermarked image to a series of image processing and collusion style attacks.These experiments are preliminary,but show resilience to certain types of common processing.Of note is our method’s resistance to compression such as JPEG,and data conversion (printing,xeroxing and scanning).Note that in the case of af?ne transforms,registration to the original image is crucial to successful extraction.
In all experiments,a watermark length of 1000was used.We added the watermark to the image by modifying 1000of the more perceptually signi?cant components of the image spectrum using (2).More speci?cally,the 1000largest coef?-cients of the DCT (excluding the DC term)were used.A ?xed scale factor of 0.1was used throughout.A.Experiment 1:Uniqueness of Watermark
Fig.6shows the response of the watermark detector to 1000randomly generated watermarks of which only one matches the watermark present in Fig.5.The positive response due to the correct watermark is very much stronger that the response to
2The
common test image Lenna was originally used in our experiments,
and similar results were obtained.However,Playboy Inc.refused to grant copyright permission for electronic
distribution.
Fig.9.JPEG encoded version of Bavarian couple with 5%quality and 0%
smoothing.
Fig.10.Dithered version of the Bavarian couple image.
incorrect watermarks,suggesting that the algorithm has very low false positive response rates.B.Experiment 2:Image Scaling
We scaled the watermarked image to half of its original size,as shown in Fig.7(a).In order to recover the watermark,the quarter-sized image was rescaled to its original dimensions,as shown in Fig.7(b),in which it is clear that considerable ?ne detail has been lost in the scaling process.This is to be expected since subsampling of the image requires a lowpass spatial ?ltering operation.The response of the watermark detector to the original watermarked image of Fig.5was 32.0,which compares to a response of 13.4for the rescaled version of Fig.7(b).While the detector response is down by over 50%,the response is still well above random chance
COX et al.:SPREAD SPECTRUM WATERMARKING
1683
(a)(b)
Fig.11.(a)Clipped version of watermarked Bavarian couple.(b)Restored version of Bavarian couple in which missing portions have been replaced with imagery from the original unwatermarked image of Fig.4.
levels suggesting that the watermark is robust to geometric distortions.Moreover,it should be noted that75%of the original data is missing from the scaled down image of Fig.7.3 C.Experiment3:JPEG Coding Distortion
Fig.8shows a JPEG encoded version of the Bavarian cou-ple image with parameters of10%quality and0%smoothing, which results in clearly visible distortions of the image.The response of the watermark detector is22.8,again suggesting that the algorithm is robust to common encoding distortions. Fig.9shows a JPEG encoded version of Bavarian couple with parameters of5%quality and0%smoothing,which results is very signi?cant distortions of the image.The response of the watermark detector in this case is13.9,which is still well above random.
D.Experiment4:Dithering Distortion
Fig.10shows a dithered version of Bavarian couple.The response of the watermark detector is5.2,again suggesting that the algorithm is robust to common encoding distortions. In fact,more reliable detection can be achieved simply by removing any nonzero mean from the extracted watermark,as discussed in Section IV-D2.In this case the detection value is10.5.
E.Experiment5:Cropping
Fig.11(a)shows a cropped version of the watermarked image of Fig.5in which only the central quarter of the image remains.In order to extract the watermark from this image, the missing portions of the image were replaced with portions from the original unwatermarked image of Fig.4,as shown 3However,subsequent experiments have revealed that if small changes of scale are not corrected,then the response of the watermark detector is severely degraded.in Fig.11(b).In this case,the response of the watermark is 14.6.Once again,this is well above random even though75% of the data has been removed.
Fig.12(a)shows a clipped version of the JPEG encoded image of Fig.8in which only the central quarter of the image remains.As before,the missing portions of the image were replaced with portions from the original unwatermarked image of Fig.4,as shown in Fig.12(b).In this case,the response of the watermark is10.6.Once more,this is well above random even though75%of the data has been removed and distortion is present in the clipped portion of the image.
F.Experiment6:Print,Xerox,and Scan
Fig.13shows an image of the Bavarian Couple after1) printing,2)xeroxing,then3)scanning at300dpi using a UMAX PS-2400X scanner,and?nally4)rescaling to a size of
256
1684IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER
1997
(a)(b)
Fig.12.(a)Clipped version of JPEG encoded (10%quality,0%smoothing)Bavarian couple.(b)Restored version of Bavarian couple in which missing portions have been replaced with imagery from the original unwatermarked image of Fig.
4.
Fig.13.Printed,xeroxed,scanned,and rescaled image of Bavarian couple.1000randomly generated watermarks,which include the ?ve
watermarks present in the image.Five spikes clearly indicate
the presence of the ?ve watermarks and demonstrate that
successive watermarking does not unduly interfere with the
process.
H.Experiment 8:Attack by Collusion
In a similar experiment,we took ?ve separately water-
marked images and averaged them to form Fig.16in order to
simulate a simple collusion attack.As before,Fig.17shows
the response of the detector to 1000randomly generated
watermarks,which include the ?ve watermarks present in the
image.Once again,?ve spikes clearly indicate the presence
of the ?ve watermarks and demonstrate that simple collusion
based on averaging a few images is an ineffective
attack.Fig.14.Image of Bavarian couple after ?ve successive watermarks have
been added.
VI.C ONCLUSION A need for electronic watermarking is developing as elec-tronic distribution of copyright material becomes more preva-lent.Above,we outlined the necessary characteristics of such a watermark.These are:?delity preservation,robustness to com-mon signal and geometric processing operations,robustness to attack,and applicability to audio,image and video data.To meet these requirements,we propose a watermark whose structure consists
of
COX et al.:SPREAD SPECTRUM WATERMARKING
1685
Fig.15.Watermark detector response to1000randomly generated water-marks(including the?ve speci?c watermarks)for the watermarked image of Fig.14.Each of the?ve watermarks is clearly
indicated.
Fig.16.Image of Bavarian couple after averaging together?ve indepen-dently watermarks versions of the Bavarian couple image.
may be used for an image that is especially sensitive to large modi?cations of its spectral coef?cients,thus requiring weaker scaling factors for inpidual components.
We recommend that the watermark be placed in the per-ceptually most signi?cant components of the image spectrum. This maximizes the chances of detecting the watermark even after common signal and geometric distortions.Further,mod-i?cation of these spectral components results in severe image degradation long before the watermark itself is destroyed. Of course,to insert the watermark,it is necessary to alter these very same coef?cients.However,each modi?cation can be extremely small and,in a manner similar to spread spectrum communication,a strong narrowband watermark may be distributed over a much broader image(channel)spectrum. We have not performed an objective evaluation of the image quality,in part because the image quality can be adjusted to any desired quality by altering the relative power of the watermark using the scale factor term.Of course,as
the Fig.17.Watermark detector response to1000randomly generated water-marks(including the?ve speci?c watermarks)for the watermarked image of Fig.16.Each of the?ve watermarks is clearly detected,indicating that collusion by averaging is ineffective.
watermark strength is reduced to improve the image quality, the robustness of the method is also reduced.It will ultimately be up to content owners to decide what image degradation and what level of robustness is acceptable.This will vary considerably from application to application.
Detection of the watermark then proceeds by adding all of these very small signals,and concentrating them once more into a signal with high SNR.Because the magnitude of the watermark at each location is only known to the copyright holder,an attacker would have to add much more noise energy to each spectral coef?cient in order to be suf?ciently con?dent of removing the watermark.However,this process would destroy the image?delity.
In our experiments,we added the watermark to the image by modifying the1000largest coef?cients of the DCT(excluding the DC term).These components are heuristically perceptually more signi?cant than others.An important open problem is the construction of a method that would identify perceptually signi?cant components from an analysis of the image and the human perceptual system.Such a method may include additional considerations regarding the relative predictability of a frequency based on its neighbors.The latter property is important in combating attacks that may use statistical analyzes of frequency spectra to replace components with their maximum likelihood estimate.For example,the choice of the DCT is not critical to the algorithm and other spec-tral transforms,including wavelet type decompositions,are also possible.
We showed,using the Bavarian couple image,that our algorithm can extract a reliable copy of the watermark from imagery that we degraded with several common geometric and signal processing procedures.An important caveat here is that any af?ne geometric transformation must?rst be inverted.These procedures include translation,rotation,scale
1686IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER1997
change,and cropping.The algorithm displays strong resilience to lossy operations such as aggressive scale changes,JPEG compression,dithering and data conversion.The experiments presented are preliminary,and should be expanded in order to validate the results.We are conducting ongoing work in this area.Further,the degree of precision of the registration proce-dures used in undoing af?ne transforms must be characterized precisely across a large test set of images.
Application of the method to color images is straightfor-ward.The most common transformation of a color image is to convert it to black and white.Color images are therefore converted into a YIQ representation and the brightness com-ponent Y is then watermarked.The color image can then be converted to other formats,but must be converted back to YIQ prior to extraction of the watermark.We therefore expect color images to be robust to the signal transformations we applied to gray-level images.However,robustness to certain color image processing procedures should be investigated.Similarly,the system should work well on text images,however,the binary nature of the image together with its much more structured spectral distribution need more work.We expect that our watermarking methodology should extend straightforwardly to audio and video data.However,special attention must be paid to the time-varying nature of these data.
Broader systems issues must be also addressed in order for this system to be used in practice.For example,it would be useful to be able to prove in court that a watermark is present without publicly revealing the original,unmarked document. This is not hard to accomplish using secure trusted hardware; an ef?cient purely cryptographic solution seems much more dif?cult.It should also be noted that the current proposal only allows the watermark to be extracted by the owner, since the original unwatermarked image is needed as part of the extraction process.This prohibits potential users from querying the image for ownership and copyright information. This capability may be desirable but appears dif?cult to achieve with the same level of tamper resistance.However, it is straightforward to provide if a much weaker level of protection is acceptable and might therefore be added as a secondary watermarking procedure.Finally,we note that while the proposed methodology is used to hide watermarks in data, the same process can be applied to sending other forms of message through media data.
A CKNOWLEDGMENT
I.Cox and T.Shamoon thank L.O’Gorman of AT&T Bell Laboratories for bringing this problem to their attention,and S. Roy for testing the robustness of the algorithm.I.Cox thanks H.Stone for advice on image transforms.
R EFERENCES
[1] E.H.Adelson,“Digital signal encoding and decoding apparatus,”U.S.
Patent4939515,1990.
[2]G.W.Braudaway,K.A.Magerlein,and F.C.Mintzer,“Color correct
digital watermarking of images,”U.S.Patent5530759,1996.
[3]W.Bender,D.Gruhl,and N.Morimoto,“Techniques for data hiding,”
in Proc.SPIE,vol.2420,p.40,Feb.1995.
[4]J.Brassil,S.Low,N.Maxemchuk,and L.O’Gorman,“Electronic
marking and identi?cation techniques to discourage document copying,”
in 4ef08e7301f69e31433294ffcom’94,pp.1278–1287.
[5] D.Boneh and J.Shaw,“Collusion-secure?ngerprinting for digital data,”
in Advances in Cryptology:Proc.CRYPTO’95.New York:Springer-Verlag,1995.
[6]G.Caronni,“Assuring ownership rights for digital images,”in Proc.
Reliable IT Systems,VIS’95..
[7]I.J.Cox,S.Roy,and S.L.Hingorani,“Dynamic histogram warping of
images pairs for constant image brightness,”in IEEE Int.Conf.Image Processing,1995.
[8]O.Faugeras,Three Dimensional Computer Vision:A Geometric View-
point.Cambridge,MA:MIT Press,1993.
[9] A.Gersho and R.Gray,Vector Quantization and Signal Compression.
Boston,MA:Kluwer,1992.
[10]R.C.Gonzalez and R.E.Woods,Digital Image Processing.New York:
Addison-Wesley,1993.
[11]P.J.Huber,Robust Statistics.New York:Wiley,1981.
[12]N.Jayant,J.Johnston,and R.Safranek,“Signal compression based on
models of human perception,”in Proc.IEEE,vol.81,no.10,1993. [13]J.Kilian et al.,“Resistance of watermarked documents to collusional
attacks,”in preparation.
[14] E.Koch,J.Rindfrey,and J.Zhao,“Copyright protection for multimedia
data,”in Proc.Int.Conf.Digital Media and Electronic Publishing,1994.
[15] E.Koch and Z.Zhao,“Toward robust and hidden image copyright
labeling,”in Proc.1995IEEE Workshop on Nonlinear Signal and Image Processing,June1995.
[16]J.S Lim,Two-Dimensional Signal Processing.Englewood Cliffs,NJ:
Prentice-Hall,1990.
[17] F.T.Leighton and S.Micali,“Secret-key agreement without public-key
cryptography,”in Proc.Cryptology,1993.
[18] B.M.Macq and J.-J.Quisquater,“Cryptology for digital TV broadcast-
ing,”in Proc.IEEE,vol.83,pp.944–957,1995.
[19]K.Matsui and K.Tanaka,“Video-steganography,”in Proc.IMA Intel-
lectual Property Project,1994,vol.1,pp.187–206.
[20]R.L.Pickholtz,D.L.Schilling,and 4ef08e7301f69e31433294fflstein,“Theory of spread
spectrum communications—A tutorial,”IEEE 4ef08e7301f69e31433294ffmun.,vol.
COMM-30,pp.855–884,1982.
[21]G.B.Rhoads,“Indenti?cation/authentication coding method and ap-
paratus,”Rep.WIPO WO95/14289,World Intellect.Property Org., 1995.
[22]W. F.Schreiber, A. E.Lippman, E.H.Adelson,and A.N.Ne-
travali,“Receiver-compatible enhanced de?nition television system,”
U.S.Patent5010405,1991.
[23] C.W.Therrien,Decision Estimation and Classi?cation:An Introduction
to Pattern Recognition and Related Topics.New York:Wiley,1989.
[24]K.Tanaka,Y.Nakamura,and K.Matsui,“Embedding secret informa-
tion into a dithered multi-level image,”in Proc.1990IEEE Military Communications Conf.,1990,pp.216–220.
[25]L.F.Turner,“Digital data security system,”Patent IPN WO89/08915,
1989.
[26]R.G.van Schyndel, A.Z.Tirkel,and C. F.Osborne,“A digital
watermark,”in Int.Conf.Image Processing,1994,vol.2,pp.
86–90.
Ingemar J.Cox(S’79–M’83–SM’95)received the
Ph.D.degree from Oxford University,Oxford,U.K.,
in1983.
From1984to1989,he was a principal investi-
gator in the Robotics Principles Department,AT&T
Bell Laboratories,Murray Hill,NJ,where his re-
search interests focused on issues of autonomous
mobile robots.He joined NEC Research Institute,
Princeton,NJ,as a senior research scientist in
1989.His principal research interests are broadly
in computer vision,speci?cally tracking,stereo and 3-D estimation,and multimedia,especially image database retrieval and electronic watermarking for copyright protection.
COX et al.:SPREAD SPECTRUM WATERMARKING
1687
Joe Kilian received the B.S.degree in computer science and in mathematics in1985,and the Ph.D.in mathematics in1989,both from the Massachusetts Institute of Technology,Cambridge.
He is a Research Scientist with NEC Research Institute,Princeton,NJ.His research interests are in
complexity theory and
cryptography.
F.Thomson Leighton received the B.S.E.degree
in electrical engineering and computer science from
Princeton University,Princeton,NJ,in1978,and
the Ph.D.degree in applied mathematics from the
Massachusetts Institute of Technology(MIT),Cam-
bridge,in1981.
He is a Professor of applied mathematics and a
member of the Laboratory for Computer Science
(LCS)at MIT.He was a Bantrell Postdoctoral
Research Fellow at LCS from1981to1983,and
he joined the MIT faculty as an Assistant Professor of applied mathematics in1982.He is a leader in the development of networks and algorithms for message routing in parallel machines,particularly in the use of randomness in wiring to overcome problems associated with congestion, blocking,and faults in networks.He has published over100research papers on parallel and distributed computing and related areas.He is the author of two books,including a leading text on parallel algorithms and
architectures.
Talal Shamoon(S’84–M’95)received the Ph.D.
degree in electrical engineering from Cornell Uni-
versity,Ithaca,NY,in January1995.
He joined the NEC Research Institute(NECI),
Princeton,NJ,in December of1994,where he held
the title of Scientist.He joined the InterTrust STAR
Laboratory,Sunnyvale,CA,in1997,where he is
currently a Member of the Research Staff working
on problems related to trusted rights management of
multimedia content.His research interests include
algorithms for audio,image and video coding and processing,multimedia security,data compression,and acoustic transducer design.He has worked on high-?delity audio coding and fast search algorithms for large image data bases.Since joining NECI,he has been actively involved in research on watermarking for multimedia systems.
正在阅读:
Secure spread spectrum watermarking for multimedia04-06
电厂电气运行试题库大全(含答案)05-02
加工贸易详细流程 五分钟让你懂加工贸易08-14
ps单独常用的快捷键04-26
解析网页后门与网页挂马05-20
电气工程及其自动化专业英语第六章05-24
第二节 大气圈与天气、气候104-23
新高考一体化学习平台-新高考走班排课选课管理平台解决方案--智04-25
中国企业并购融资中存在的问题及其对策03-08
- 1Unit - 8 - The - Spread - of - Western - Culture - Threatens - Local - Cultures
- 2Fitting the spectrum of the X-ray background the effects of high metallicity absorption
- 3Large-Scale Mass Power Spectrum from Peculiar Velocities
- 4Farpoint Spread For Windows Forms 5.0 使用指南 中文
- 5Design of an economics-based software infrastructure for secure utility computing on superc
- 6Cisco Secure ACS 4.0 中文简易使用手册
- 7Acquire get attain obtain gain earn achieve secure的用法辨析
- 8Secure Content Management In Ambient Environments- how about security and meta-data-
- 9Secure Content Management In Ambient Environments- how about security and meta-data-
- 10A spectrum of de nitions for temporal model-based diagnosis. Arti cial Intelligence (to app
- exercise2
- 铅锌矿详查地质设计 - 图文
- 厨余垃圾、餐厨垃圾堆肥系统设计方案
- 陈明珠开题报告
- 化工原理精选例题
- 政府形象宣传册营销案例
- 小学一至三年级语文阅读专项练习题
- 2014.民诉 期末考试 复习题
- 巅峰智业 - 做好顶层设计对建设城市的重要意义
- (三起)冀教版三年级英语上册Unit4 Lesson24练习题及答案
- 2017年实心轮胎现状及发展趋势分析(目录)
- 基于GIS的农用地定级技术研究定稿
- 2017-2022年中国医疗保健市场调查与市场前景预测报告(目录) - 图文
- 作业
- OFDM技术仿真(MATLAB代码) - 图文
- Android工程师笔试题及答案
- 生命密码联合密码
- 空间地上权若干法律问题探究
- 江苏学业水平测试《机械基础》模拟试题
- 选课走班实施方案
- watermarking
- multimedia
- spectrum
- Secure
- spread
- 2022-2022年九年级数学上学期诊断性测试试卷
- 大班下学期语言教案《梦》含反思
- 钢筋加工场管理制度
- 中药和古子的主要治疗疾病
- 欧盟一般食品法Regulation (EC) No 178-2002中文翻译
- 香港朗文一年级英语1B_chapter_2
- 东师学前儿童心理学19春在线作业2【标准答案】
- 建立主题网站——网页的初步设计与制作
- 洁具及给水配件安装高度.docx
- 攀岩的基本方法及练习技巧
- The+Elements+of+Style(revised)
- 浙江省高等教育自学考试电视节目导播试题.doc
- 2022届高考历史二轮复习系统强化练:专题五近代中国经济结构的变
- 化妆品常用检测教学内容
- 2015-2016第二学期小学教学教研工作计划
- 《3-6岁儿童学习与发展指南》复习要点(五大领域).docx
- 公安践行十八大演讲稿向党靠拢,听党指挥
- 数学教案-关于三角形的一些概念.doc
- (完整版)初中物理电学经典题型汇编电功、电功率(新)
- 卫生统计学试题(含答案)