Method of Spread Spectrum Watermarking Using Quantization Index Modulation for Cropped Images

SUMMARY We propose a method of spread spectrum digital watermarking with quantization index modulation (QIM) and evaluate the method on the basis of IHC evaluation criteria. The spread spectrum technique can make watermarks robust by using spread codes. Since watermarks can have redundancy, messages can be decoded from a degraded stego-image. Under IHC evaluation criteria, it is necessary to decode the messages without the original image. To do so, we propose a method in which watermarks are generated by using the spread spectrum technique and are embedded by QIM. QIM is an embedding method that can decode without an original image. The IHC evaluation criteria include JPEG compression and cropping as attacks. JPEG compression is lossy compression. Therefore, errors occur in watermarks. Since watermarks in stego-images are out of synchronization due to cropping, the position of embedded watermarks may be unclear. Detecting this position is needed while decoding. Therefore, both error correction and synchronization are required for digital watermarking methods. As countermeasures against cropping, the original image is divided into segments to embed watermarks. Moreover, each segment is divided into 8 × 8 pixel blocks. A watermark is embedded into a DCT coefficient in a block by QIM. To synchronize in decoding, the proposed method uses the correlation between watermarks and spread codes. After synchronization, watermarks are extracted by QIM, and then, messages are estimated from the watermarks. The proposed method was evaluated on the basis of the IHC evaluation criteria. The PSNR had to be higher than 30 dB. Ten 1920 ×1080 rectangular regions were cropped from each stego-image, and 200-bit messages were decoded from these regions. Their BERs were calculated to assess the tolerance. As a result, the BERs were less than 1.0%, and the average PSNR was 46.70 dB. Therefore, our method achieved a high image quality when using the IHC evaluation criteria. In addition, the proposed method was also evaluated by using StirMark 4.0. As a result, we found that our method has robustness for not only JPEG compression and cropping but also additional noise and Gaussian filtering. Moreover, the method has an advantage in that detection time is small since

[1]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[2]  Hideki Noda,et al.  High-performance JPEG steganography using quantization index modulation in DCT domain , 2006, Pattern Recognit. Lett..

[3]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[4]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[5]  Morii Masakatu,et al.  DCT-OFDM Based Watermarking Scheme Robust againsut Clipping Attack , 2013 .

[6]  Jiwu Huang,et al.  CDMA-based watermarking resisting to cropping , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[7]  Kai Wang,et al.  Adaptive spread transform QIM watermarking algorithm based on improved perceptual models , 2013 .

[8]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[9]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[10]  Amit Phadikar Multibit quantization index modulation: A high-rate robust data-hiding method , 2013, J. King Saud Univ. Comput. Inf. Sci..

[11]  Masaki Kawamura,et al.  Asynchronous Stochastic Decoder for Spread Spectrum Digital Watermarking , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Masakatu Morii,et al.  Iterative Detection Method for CDMA-Based Fingerprinting Scheme , 2008, Information Hiding.

[13]  Toru Fujiwara,et al.  A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[15]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[16]  Masaki Kawamura,et al.  Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading , 2009, ICITS.

[17]  Masaki Kawamura,et al.  Performance Evaluation for Decoder with Asynchronous Stochastic Algorithms and Temperature Schedules for Spread Spectrum Model , 2013 .

[18]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[19]  Masaki Hakka,et al.  DCT-OFDM based watermarking scheme robust against clipping attack , 2014, IWIHC '14.

[20]  Mohammad S. Obaidat,et al.  Digital watermarking-based DCT and JPEG model , 2003, IEEE Trans. Instrum. Meas..

[21]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[22]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.