An ASIC implementation of a low power robust invisible watermarking processor

Digital watermarking is the process of embedding data called watermark into a multimedia object so that it can be detected or extracted later to make an assertion about the object. Several software implementations of watermarking algorithms are available, but very few attempts have been made for hardware implementation. The objective of this research paper is to implement ''low power robust invisible binary image watermarking processor'' in an Application Specific Integrated Circuit (ASIC) using Hardware Description Language (HDL). An 8-bit processor has been used since it consumes less power than other higher order bit (16-bit, 32-bit, etc.) processors. The proposed invisible watermarking algorithm is implemented in spatial domain. The proposed algorithm is prototyped (i) using XILINX FPGA (ii) using ASIC. To the best of our knowledge this is the first low power binary image watermarking processor implemented in ASIC which uses 8-bit processor with no limitation on input size. The algorithm is tested in Virtex E (xcv50e-8-cs144) Field Programmable Gate Arrays (FPGA) and implemented in an ASIC.

[1]  Edward J. Delp,et al.  An overview of multimedia content protection in consumer electronics devices , 2001, Signal Process. Image Commun..

[2]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[3]  Hen-Wai Tsao,et al.  Hardware-efficient architecture design of adaptive visible watermarking , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..

[4]  Anastasios Tefas,et al.  Image authentication techniques for surveillance applications , 2001, Proc. IEEE.

[5]  D. de Leeuw Duarte,et al.  Reconfigurable Computing: A Survey of Architectures and Synthesis Tools V1.0 , 2005 .

[6]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[7]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[8]  Saraju P. Mohanty,et al.  A VLSI architecture for visible watermarking in a secure still digital camera (S/sup 2/DC) design (Corrected)* , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[9]  Anastasios Tefas,et al.  Robust spatial image watermarking using progressive detection , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[10]  S. Mohanty,et al.  A VLSI Architecture for Visible Watermarking in a Secure Still Digital Camera ( S 2 DC ) Design , 2005 .

[11]  Saraju P. Mohanty,et al.  A dual voltage-frequency VLSI chip for image watermarking in DCT domain , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[12]  Alex ChiChung Kot,et al.  Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.

[13]  U.C. Niranjan,et al.  ASIC for digital color image watermarking , 2004, 3rd IEEE Signal Processing Education Workshop. 2004 IEEE 11th Digital Signal Processing Workshop, 2004..

[14]  Saraju P. Mohanty,et al.  FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder , 2004, CIT.

[15]  Dong-Wook Kim,et al.  Real-Time Blind Watermarking Algorithm and its Hardware Implementation for Motion JPEG2000 Image Codec , 2003, ESTImedia.

[16]  Chang-Tsun Li Digital fragile watermarking scheme for authentication of JPEG images , 2004 .

[17]  Saraju P. Mohanty,et al.  VLSI architecture and chip for combined invisible robust and fragile watermarking , 2007, IET Comput. Digit. Tech..

[18]  Graham A. Jullien,et al.  CMOS image sensor with watermarking capabilities , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[19]  Annajirao Garimella,et al.  VLSI implementation of online digital watermarking technique with difference encoding for 8-bit gray scale images , 2003, 16th International Conference on VLSI Design, 2003. Proceedings..

[20]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[21]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[22]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[23]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[24]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[25]  Alexandru ISAR DIGITAL WATERMARKING OF IMAGES AND WAVELETS , 2002 .

[26]  Deepa Kundur,et al.  Hardware implementation perspectives of digital video watermarking algorithms , 2003, IEEE Trans. Signal Process..

[27]  M.B. Pursley,et al.  Crosscorrelation properties of pseudorandom and related sequences , 1980, Proceedings of the IEEE.

[28]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[29]  F. MacWilliams,et al.  Pseudo-random sequences and arrays , 1976, Proceedings of the IEEE.

[30]  Saraju P. Mohanty,et al.  VLSI implementation of invisible digital watermarking algorithms towards the development of a secure JPEG encoder , 2003, 2003 IEEE Workshop on Signal Processing Systems (IEEE Cat. No.03TH8682).

[31]  Shen-Fu Hsiao,et al.  VLSI design of an efficient embedded zerotree wavelet coder with function of digital watermarking , 2000, IEEE Trans. Consumer Electron..

[32]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[33]  Saraju P. Mohanty,et al.  VLSI implementation of visible watermarking for secure digital still camera design , 2004, 17th International Conference on VLSI Design. Proceedings..

[34]  Hal Berghel Watermarking cyberspace , 1997, CACM.

[35]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[36]  Hal Berghel,et al.  Cyberspace 2000: dealing with information overload , 1997, CACM.