Robust watermarking scheme for still images using frequency shift keying with high-variance block selection

Watermarking is a potential method for copyright protection and authentication of multimedia data on the Internet. The watermarking process can be viewed as a communication task, where the watermark, acting like information, is embedded into a host image, acting like noise, in a communication channel that is susceptible to all kinds of attacks, acting like jamming. In this paper, a novel watermarking scheme using frequency-shift keying (FSK) modulation with high-variance block selec- tion is proposed to achieve superior performance in robustness and im- perceptibility. In the proposed scheme, a secret bit is embedded into two rather than one DCT coefficient of a block. This is analogous to the FSK as opposed to the amplitude-shift keying (ASK) modulation in digital communication. High-variance block selection (HVBS) is employed to enhance robustness. In order to solve the synchronization problem caused by HVBS, local block selection and a novel technique called the two-state constraint is implemented. In order to demonstrate the effect- ness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks, including JPEG compression, rotating, resizing, cropping, painting, noising, and blurring. A comparison between watermarking with and without HVBS shows that HVBS with the two- state constraint can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with fluctuation characteristics than for those with smooth char- acteristics. The comparison between ASK and FSK shows that the ex- tracted watermark from the latter deteriorates gracefully and that from the former is blown out as the strength of a JPEG attack rises beyond a threshold. For other common attacks, the ASK and FSK perform about the same except, for the blurring attack, for which the extracted water- mark from the latter can be clearly identified while that from the former is blown out. © 2003 Society of Photo-Optical Instrumentation Engineers.

[1]  Y. Q. Fu,et al.  Perceptual digital watermark of images using wavelet transform , 1998 .

[2]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[3]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Wen-Shyong Hsieh,et al.  Digital watermarking using zerotree of DCT , 2000, IEEE Trans. Consumer Electron..

[5]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[6]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[7]  Ja-Ling Wu,et al.  DCT-based watermarking for video , 1998 .

[8]  Sheng-He Sun,et al.  Digital image watermarking technique based on vector quantisation , 2000 .

[9]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[10]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[11]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[12]  Akihiro Yamamoto,et al.  A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation , 1999 .

[13]  Min-Jen Tsai,et al.  Joint wavelet and spatial transformation for digital watermarking , 2000, IEEE Trans. Consumer Electron..

[14]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[15]  K. Rao,et al.  Wavelet based image adaptive watermarking scheme , 2000 .