<< Chapter < Page Chapter >> Page >

Our goal is to observe and to analyze the robustness of a watermarking technique under image compression. With that in mind, it is important to choose the appropriate watermarking technique for our application. Digital watermark can be applied in the spatial domain, spectral domain, or the combination of the two with variety of different implementation methods for each. Since the focus is robustness, a spectral watermarking technique in general performs better in retaining the watermark under different attacks without significant degradation in image quality. Three popular implementations of spectral watermarking algorithms are Cox’s DCT (Discrete Cosine Transform), Xia Boncelet’s DWT (Discrete Wavelet Transform), and FM Boland’s DFT (Discrete Fourier Transoform). Cox’s algorithm has the characteristics best suited for our analysis.

Cox’s watermarking algorithm utilizes DCT to implement the watermark. Comparing to DFT, DCT yields a higher signal to noise ratio under SVD compression making it a good choice for our application. The algorithm computes the 2D DCT of the host image, image used for watermarking. To ensure the watermark can withstand attacks, the algorithm embeds the watermark in the 1000 greatest DCT values. Cox’s watermarking algorithm uses a correlation based non-blind detection system. It requires the original, unaltered message to extract the watermark. Unlike many other watermarking techniques, not only could cox’s algorithm provide an authentication check, it could also be used to send hidden messages through its watermark. Only recipients with the key, the original host image, can extract the watermarked message from the image.

Encoding block diagram

For the implementation of the watermarking system, first host image is chosen to embed the watermark. For simplicity, our analysis focuses on a 512 by 512 black and white image of the classic Lena as the host image. The watermark is represented by a string, message, with length less than or equal to 1000. The message is first feed through an encoder to convert each character into their respective ACSII representations and then scaled to between 0 and 1.

Host image

Host image's dct representation

The resulting code is then used as the watermark. To embed the watermark to the host image, the host image is read by Matlab, converted into matrix representation, and transformed using DCT. Excluding the largest value, the DC value, the next largest 1000 DCT values are used to carry the watermark. The values multiplied by corresponding watermarking values scaled by 0.1 and then add to original values. Then the DCT matrix is converted back to spatial domain, generating a watermarked image.

Decoding block diagram

To extract the watermark message from the watermarked image, the reverse process is applied. The code is extracted from DCT of the watermarked image by subtracting the original value from the larger, watermarked image. The code is then converted back to the message by rescaling and matching with the characters represented by the ASCII values. Rounding is used to eliminate the rounding errors in the calculations.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Robustness analysis on dct watermarking technique under compression attack. OpenStax CNX. Dec 19, 2012 Download for free at http://cnx.org/content/col11472/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Robustness analysis on dct watermarking technique under compression attack' conversation and receive update notifications?

Ask