IEICE
TRANS.
FUNDAMENTALS,
VOL.E91-A,
NO.8
AUGUST
2008
1961
PAPER
Special Section on Signal Processing
Differential Energy Based Watermarking Algorithm Using Wavelet Tree Group Modulation (WTGM) and Human Visual System Min-Jen
SUMMARY Wavelettree basedwatermarkingalgorithmsare usingthe waveletcoefficientenergy differencefor copyrightprotectionand ownershipverification.WTQ(WaveletTreeQuantization)algorithmis therepresentativetechniqueusing energydifferencefor watermarking.According to the cryptanalysison WTQ,the watermarkembeddedin the protected imagecan be removedsuccessfully.In thispaper,we presenta noveldifferentialenergywatermarkingalgorithmbased on the wavelettree group modulationstructure,i.e. WTGM(WaveletTreeGroupModulation).The waveletcoefficientsof hostimageare dividedintodisjointsupertrees(each super tree containingtwo sub-supertrees). The watermarkis embedded in the relativelyhigh-frequencycomponentsusingthe groupstrategysuch that energiesof sub-supertreesare close.The employmentof wavelettree structure,sum-of-subsetsandpositive/negativemodulationeffectivelyimprovethe drawbacksof the WTQ schemefor its insecurity.The integration of the HVS(HumanVisual System)for WTGMprovidesa better visual effectof thewatermarkedimage.Theexperimentalresultsdemonstratethe effectiveness of our algorithmin termsof robustnessand imperceptibi li ty. keywords: copyrightprotection,HumanVisualSystem,imagewatermarking,wavelet,wavelettree quantization 1.
Introduction
Digital media files can be easily copied and distributed without any reduction in quality. As a result, digital media files are being widely distributed on the Internet today, through both authorized and unauthorized distribution channels. Piracy is a concern when security measures are not in place to protect content. Conventional cryptographic
systems permit only valid
principals (key holders) access to encrypted data. Once such digital data are decrypted, there is no way to track their reproductions or retransmissions. Over the last decade, digital watermarking has been presented to complement cryptographic protection mechanisms. Invisible watermarks can be broadly classified into three types, i.e. robust, fragile (or semi-fragile) and captioning watermarks [1], [2]. Robust watermarks are generally used for copyright protection and ownership verification as they are robust to nearly all kinds of image processing attacks. Fragile or semi-fragile watermarks are mainly applied to content authentication and integrity attestation as they are fragile to most modifications. Captioning watermarks are usually used for side information conveyance, which are required to convey more information than robust watermarks do. Manuscript received November 12, 2007. Manuscript revised March 10, 2008. The authors are with Institute of Information Management, National Chiao Tung University, Hsing-Chu, 300 Taiwan. a) E-mail:
[email protected] DOI: 10.1093/ietfec/e91-a.8.1961 Copyright (c)
2008
The
Institute
of Electronics,
TSAI†a),
Member
and
Chang-Hsing
SHEN†,
Nonmember
Cox et al. [1] proposed a global DCT-based spread spectrum approach to hide watermarks. The frequency domain of the image or sound is viewed as a communication channel, and correspondingly, the watermark is viewed as a signal that is transmitted through it. The watermark is spread over very many frequency bins so that the energy in any one bin is very small and certainly undetectable. Langelaar and Lagendijk [3] introduced the DEW (Differential Energy Watermarking) algorithm for JPEG/MPEG streams in the DCT domain. The DEW algorithm embeds label bits (the watermark) by selectively discarding high frequency DCT coefficients in certain image regions. Wang and Lin [4] introduced the philosophy of WTQ (Wavelet Tree Quantization) in the DWT domain. The wavelet coefficients are grouped into so-called super trees. The wavelet-tree-based watermarking algorithm embeds watermark bits by selectively quantizing super trees. Whether the security of watermarking algorithms can be preserved if the details about algorithms are released is always a controversial issue among watermarking researchers. However, the algorithm will be known to the attacker as it is accepted in the field of cryptology [5]. Das, Maitra and Mitra had presented a successful cryptanalysis against the DEW scheme in [5]. There is a need to analyze each of the popular watermarking algorithms individually and to check whether customized attacks can be mounted to highlight the weakness of the individual watermarking algorithm itself. In this paper, we first introduce the WTQ scheme and then explain how this watermarking algorithm can be attacked by cryptanalysis. Based on the motivation to improve the security robustness of WTQ, we present a differential energy watermarking algorithm based on the wavelet tree group modulation structure, i.e. WTGM (Wavelet Tree Group Modulation). The usage of group modulation makes the proposed watermarking algorithm robust against common signal processing attacks and results in a better detector response. With the characteristic of the wavelet tree structure throughout large spatial regions, it is more robust against geometric distortions. The employment of sum-ofsubsets makes the proposed watermarking algorithm more robust against general cryptanalysis. In addition, the consideration to the CSF (Contrast Sensitive Function) and NVF (Noise Visibility Function) of the HVS (Human Visual System) provides a better visual effect of the watermarked image. The remainder of this paper is organized as follows. In Information
and Communication Engineers
IEICE TRANS. FUNDAMENTALS,
VOL.E91-A,
NO.8 AUGUST 2008
1962
Sect.
2,
the
WTQ
nerability
is
WTGM
scheme
reviewed
in
watermarking
experimental
6, respectively.
2.
WTQ
Scheme
The
WTQ
scheme
ing
scheme.
and
is
and
we
2.1
the
Super
the
one
WTQ
quence
of
should
to
{1,-1}.
the
1 coefficient 16
While bed
the
of
will
be
a pair
the rent in
trees
are
is
detailed
to record
a binary
PN
watermark in Fig.
i={2,3,4} A group
has
we
and
col-
j={1,2,3}, coefficients:
from
level-3, two
tree
(a)
se-
bits,
1(a),
and 21
grouping,
and
groups
and
are
there
WTQ
pair
two
operation, for
are
42
(b)
will
pair.
with
one
super
tree
information
example,
quantize
if
the
Otherwise,
the
to em-
trees
the
For
starts
super so
recording bit.
1, we
corresponding
all
we
watermark bit
for
is used is
grouped,
Here
quantized
watermark the
trees
a super
quantization
corresponding
5
tree.
bits.
for
Sects.
watermark-
[4]
shown
After
super
super
seed
The
in
operations:
4 coefficients
to become
watermark
a secret
as
level-2.
every
all
super
recording
DWT
combined in
the
details.
blind Ref.
vul-
proposed
given
based refer
watermark
level-4,
from
coefficients
of
in Ci ,j, where in Fig. 1(b).
from
randomly
tree
its
the
in
are
can
the
Before
coefficients
4,
Tree
4-level
groups
and
Sect.
described
explain
and
coefficients
form
is
a pair
bit,
perform
locate
briefly
scheme,
watermark
explained In
conclusions
reader
information
In
3.
a wavelet
Interested
Group
briefly
method
results
and
is Sect.
left
of
the
cur-
super
right
tree
one
will
be
trees
will
be
quantized. In
order
transformed
to perform
quantization,
to •gbit-plane•h
form
all
super
first.
(c) 2.2
A as
Form
super
tree
shown
which Fig. ger bits
the
will 1(c),
Bit-Plane
will
be
in
Fig.
be
removed
the
pair.
If we
pair
will
be
quantized. can
get
the
error. will be
bit
we to
of
is the
same
is
the
with
found
find
the
trees
out
In
a tree-
tree
is we
information
we
know order
tree, of
In
Cryptanalysis
[6],
Das
termarking model
and
which
Maitra
algorithm by
weakness. is image
that
be
the
dependent,
on the paper
every
tested
Therefore,
techniques As
claimed
as
The
Das
WTQ
and
scheme,
existing a
and
says, •gKnowledge but
not
dependent
put found of
on
secret
every
super
destroy
can
use
removal
of
constructing
the
correlation.•h
a super tree
is
tree
obtained
watermarking
indirect
Although
is
unknown,
with
two
information
technique
through
but groups.
in
the
super
knowledge
cryptanalysis
on
identification
WTQ
of quantized
estimate
of
quantized
groups.
reference
error,
can and and
be
divided
into
non-quantized
tree
groups,
quantization
of
non-
wa3.1
cryptographic Maitra
of
groups.
bit.
WTQ
should
cryptanalysis.
cryptanalytic the
on
successful
that to
we
steps: 3.
for
the
In
in a tree-
pattern,
watermark
is enough
scope,
which
quantization
current
bits
or big-
with
both
will
the
of error.
recorded
watermark,
then
according
information
reference
have
format
scope
the
When we discarded.
the
and
bit-plane the
area
watermark
checked
the
to
gray
to extract
Thus,
to
calculating
of the
every
want
for
according
energy
WTQ,
Quantization
transformed
1(c)
than the reference in the gray area In
for
Fig. 1 Illustrations of the wavelet transform and groups of wavelet coefficients. (a) A four-level wavelet transform and its subbands. The coefficients correspond to the same spatial location are grouped together. (b) The 21 coefficients of a wavelet tree. (c) Binary representation of the coefficients in the nth super tree. The shaded area denotes the bits to be discarded.
the
Identification
of
Quantized
and
Non-quantized
Groups
out
groups, seed,
All
groups
identification.
will The
be
transformed principle
into is calculating
bit-plane the
format energy
for of
last
TSAI
and SHEN:
DIFFERENTIAL
ENERGY
BASED
WATERMARKING
ALGORITHM
1963
rows.
In our
last
rows
this
group
simulation,
in current as
a quantized
non-quantized
group.
3.2
Estimate
of
After
identification,
estimate. groups every
last group
First,
we
are
used.
empty,
we
Otherwise,
this
If the
bits
can
assume
group
of
4.1
is
a
take
the
set the
of
quantized
quantization
find out that Thus, ƒÃ' is
the the
energy estimated
groups error
for of
removed reference
all in
error.
3.3
Quantization of Non-quantized Groups
When reference error has been estimated, the set of nonquantized groups will be quantized using this estimated reference error. After this step, all groups are almost quantized. In WTQ, every watermark bit is recorded by quantizing only one tree in a pair. Making all groups quantized means making all super trees quantized because a super tree is merged with two groups. Thus, if all trees are quantized, the difference caused by quantization between two trees in a pair will be eliminated. As the difference between both trees declines, it is difficult for the detector to extract the watermark bit accurately. According to our simulation of the cryptanalysis attack for WTQ, the unquantized bitplane could be successfully identified and the last two rows could be removed. Therefore, the watermark will be removed even without the reference error estimation. Therefore, WTQ is not secure enough for digital watermarking in principle. 4.
Designs of WTGM Algorithm
There are several issues need to be addressed if the energy difference will be applied for the wavelet based watermarking scheme. The first is the choice of the tree structure. How many levels should the image to be decomposed and achieve the robustness and the scalability of the watermark? The second is how to balance the robustness and the fidelity of the image on a designed energy differential watermarking algorithm? The third is how to maximize the detector response in order to render a better performance. The fourth is the security of the watermarking algorithm, the most important issue to be addressed. To resolve those mentioned issues, the same pyramidal decomposition is applied in WTGM. In addition, the idea of sum-of-subsets [5] for selecting supertrees is adopted to securely embed the watermark. Instead of the bit plane quantization for watermark embedding, the usage of positive/negative modulation will effectively render a better detector response. Also, the consideration to the CSF and NVF of the HVS provides a better visual effect and imperceptibility. The details will be explained next.
PM (Positive Modulation) and NM (Negative Modulation)
Lu, et al. [7] had analyzed the behaviors of transformed coefficients under attacks. In principle, there are four
Error
calculate
in the set, and group is almost ƒÃ'.
rows
almost
group.
Reference
we
two
are
possible types of modulations: Modu(+, +), Modu(+, -), Modu(-, +), and Modu(-, -), where Modu(+/-, -/+) denotes a positive/negative transformed coefficient modulated with a negative/positive watermark quantity. No matter whether the DCT or the wavelet domain is employed, the probabilities of occurrence of the four types of modulations are all very close to 0.25. They further classified the behaviors of attacks into two categories. The first category contains those attacks like compression and blurring, which tend to decrease the magnitudes of most of the transformed coefficients. Under these circumstances, it is hoped that every transformed coefficient can be modulated with a quantity that has different sign. The reason is that it can adapt to compression-style attacks and enables more than 50% of the modulated targets to contribute a bigger positive value to the detector response. Only Modu(+, -) and Modu(-, +) will contribute positively to the detector response. The second category contains those attacks such as sharpening and histogram equalization, which have the tendency of increasing most of the magnitudes of transformed coefficients. Only Modu(+, +) and Modu(-, -) will contribute positively to the detector response. Lu, et al. emphasized that the random modulation strategy does not help the detector response. Scenarios in the attacking process are illustrated in Fig. 2. No matter whether the positive modulation or the negative modulation is employed, the modulated wavelet coefficient can effectively resist the attack in scenario 1 and 2. However, the modulated wavelet coefficient is unable to resist the attack alone in scenario 3 if the strength of the attack is larger than that of the modulation. If a watermarking algorithm simultaneously employs the positive modulation and the negative modulation in embedding a watermark bit, it can succeed in resisting the attack in scenario 3 (as cocktail watermarking did in [7], which simultaneously embedded two watermarks in complementary roles). Since the DEW scheme and the WTQ scheme only employed the philosophy of negative modulation, the detector was unable to bring the brilliant results under any kind of attacks mentioned above. Moreover, the scheme can be easily defeated by the attacker if it only employs unilateral modulation, regardless of the positive modulation or the negative modulation. Thus, a good differential energy watermarking algorithm should take both modulated methods into account for higher detector response and better security. 4.2
Wavelet Tree Structure
We employ the same wavelet tree structure as depicted in the WTQ scheme. However, each tree can be extended to involve high-frequency components as illustrated in Fig. 4.
IEICE
TRANS.
FUNDAMENTALS,
VOL.E91-A,
NO.8
AUGUST
2008
1964
Suppose that each watermark bit is embedded using one super tree, half of a super tree is used for PM and the other is used for NM. We use the term super tree to refer to the collection of n trees (i.e. 1 super tree=n trees). A particular super tree can be divided into two sub-super trees, each containing n/2 trees. The energy of a tree t is defined as the sum of absolute values of q-p+1 wavelet coefficients. The energies of sub-super tree A and sub-super tree B are given by: EA(p,q,n)=Σ
Σ│θi,t│
(1)
EB(p,q,n)=Σ
Σ│θi,t│
(2)
(a)
where Įi
,t denotes q denotes the
and lation
from
p
sub-super suitable
for
judging B differ
4.4
(b) Fig.
2
Scenarios
Negative
in
the
attacking
modulation. •go•h
indicates
the
wavelet
process.
denotes
modulated
the
wavelet
(a)
original
coefficient,
Positive
modulation.
wavelet
coefficient, •gm•h
and •ga•h
means
the
For
attacked
by
be
a collection
from
level
level
2,
and
64
idea
of
adopted
in
sum
to
there
The
W.
are In
For
As
to
a key
factor,
if we
to form modulate bedded.
the
can
for
[8]
and
coefficient
be
they
all
Das,
two
will
be
out
coefficients
supertrees
the
as
wi
subsets
and
of
in-
integers
that
W=31,
and
how
trees tree,
according
we
can can the
is
that
NP-
used
this
[5]
the
DEW
the
coefficients
be use
scheme. are
aggregation. in the set
grouped this
watermark
of
HVS
visibility
various
the
quency
and
variation
of grating
has
of
measurements were
spatial
contrast
is
given
on and
thresholds
of of
for by
as
periodic the
for
good of
are
the
such
thresholds. gratings by
study by
a measure pattern
given
was the
such
the
studied
sinusoidal
orientations
gratings
Contrast
luminance
signals
to determine
purpose
orientation.
a need properties
visual
performed
frequencies The
been
incorporates
thresholds
conditions.
termine
that
to
given of as
defre-
relative a sinu-
equation
(3)
where Lmaxand Lminare maximal and minimal luminance of a grating. Reciprocal values of contrast thresholds express the contrast sensitivity (CS), and Mannos and Sakrison [9] originally presented a model of the contrast sensitive function (CSF) for luminance (or grayscale) images is given as follows:
then
an
Mitra of
idea
of
be
a criterion
H(f)=2.6*(0.0192+0.114*f)*e-(0.114*f)1.1 itself
a closed value of energy of a tree as an element
super
The
following:
a positive
the
problem
the
Function)
there
quality
measurements
with
{24,7}.
Maitra
which
is
watermark.
formulated
vulnerability
it renders with energy
selecting
S={11,13,24,7},
the
is just
of sub-super tree A and to some small quantity ƒÂ.
images,
image
The
viewing
from
will
energy or equal
two
will
C=(Lmax-Lmin)/(Lmax+Lmin)
embed be
{11,13,7},
so-called the
There
will
WTGM
sum-of-subsets
find
tree
coefficients
1.
(weights)
find
example,
resolve
grouped together If we treat the and
integers is to
problem.
method
WTGM
[5]
can
the
3, 16
level
for
securely
subsets:
fact,
one
Any
i.e. |EA-EB|•…ƒÂ,
Sensitive
psychovisual
soidal
to
goal
two
complete
for
problem n positive
W.
level
from
sum-of-subsets WTGM
are
teger
from
S2
each
coefficients,
Selection
sum-of-subsets There
and 5.
Trees
is transformed,
wavelet
coefficients
set S1 in Sect.
Super
The
85
4, 4 coefficients
parameter discussed
4.3
of
image
(Contrast
for
These a 512•~512
the than
watermarked
metrics HVS.
that
0•…q•…84).
EA=EB,
modulation. |EA-EB|•…ƒÂ
whether by less
CSF
q (0•…p•…84, with
in the tree t, p do the modu-
to
(b)
coefficient.
Suppose
to
trees
the ith wavelet coefficient coefficient number used
S,
together principle bit
to em-
where
f=√
f x2 + f y2
is
the
spatial
frequency
(4) in
cy-
cles/degree of visual angle (fx and fy are the spatial frequencies in the horizontal and vertical directions, respectively). Figure 3 depicts the CSF curve which characterizes luminance sensitivity of the HVS as a function of normalized spatial frequency. According to the CSF curve, we can see that the HVS is most sensitive to normalized spatial frequencies between 0.025 and 0.125 and less sensitive to low and high frequencies [10]. Therefore, this knowledge from CSF
TSAI and SHEN: DIFFERENTIAL
ENERGY BASED WATERMARKING
ALGORITHM
1965
(5)
βk=0.01+(7.20-rk)2/7.202
where k denotes the decomposed level and rk represents the wavelet coefficient CSF of the perceptual importance weight as Fig. 4 shows. The level 1 has the largest rate for modulation, which corresponds to high-frequency components. The level 3 has the smallest rate for modulation. Under the circumstances the sum-of-subsets is employed, the actual modulation quantity of low-frequency components will be relatively small since they have larger energies. Contrarily, the actual modulation quantity of highfrequency components will be relatively large since they have smaller energies. In our study, low-frequency comFig. 3
ponents can tolerate more common signal processing while high-frequency components can tolerate more geometric attacks. The usage of high-frequency components is pretty different from the WTQ scheme for its nature of watermarking.
Luminance CSF (Courtesy of [10]).
4.5
NVF (Noise Visibility Function) of HVS
S. Voloshynovskiy et al. [14] presented a stochastic approach based on the computation of a NVF (Noise Visibility Function) that characterizes the local image properties and identifies texture and edge regions. This allows us to determine the optimal watermark locations and strength for the watermark embedding stage. Their argument: the channel capacity is not uniform, i.e. the noise is more visible in flat areas and less visible in regions with edges and textures. Accordingly, when the local variance is small, the image is flat, and a large enough variance indicates the presence of edges or highly texture areas. The adaptive scheme based on NVF calculated from stationary GG model is the best model in our simulation, which is defined as follows: Fig. 4 A four-level wavelet tree structure. The coefficients correspond to the same spatial location are grouped together. Each tree consists of one coefficient
from
level
4, 4 coefficients
from
level 2, and 64 coefficients from level indicated at the center of each band.
level
3, 16 coefficients
1. rk(ƒÀk) values
for each
NVF(x,y)=w(x,y)/ w(x,y)+σ2I
from
level k are
where
w(x,y)=γ[η(γ)]γ/‖r(x,y)‖2-γ
variance.
η(γ)=√
(gamma can
be
used
to
develop
a
simple
[10]-[13]
is
image
independent
HVS
the
model. CSF in
the
the to
masking
discrete
method their
wavelet of
masks
which
ceptual
transforms
importance
mask
in the
five-level
12-weight
DWT
each
CSF
the
same
are
wavelet CSF
in in
to
with
[11].
12-weight
transform.
mask
Fig.
Figure the
weights
CSF
refers
into
of
use CSF
subband
the
square
masking. is
determined
function The
in
adequate by:
[10]
to
parameter
and
rate
which
DWT
CSF
time
the
rate ƒÀk
variance.
watermark.
Since
a better
which
For
is
most
very
CSF visual
renders
a better
4.6
WTGM
Algorithm
We
summarize
the
ing
algorithms,
which
real
local
images,
the
close,
the
image
CSF
and
NVF
the
energy
enhance
constraints
watermark
regions
of
the
of the and
the
edge
is by
0.3•…ƒÁ•…1.
visibility the
enhance
global
∞0e-uus-1du
determined
combination the
retains
is
range
value
The
decrease
NVF
r(x,y)
is in the PSNR
σ2I is the
Γ(s)=∫
r(x,y)=(I(x,y)-I(x,y))/ƒÐI. ƒÁ and
local
the
effectively
Huang
shown
and
different.
the
4 illustrates
the
Even
per-
approximate
modulation
and
and
Γ(3/γ)/Γ(1/γ),
parameter
shape
is quite
CSF 3
function)
shape
mean
to
according
well-designed
curve
led
the
masking
presented
method
apply
coefficients
Some CSF
to
effect,
the
detector
can of
modulation
while
strength
quality
at the in texture
same and
response.
for
subband. We
effect
use
way
wavelet
the
weight
[10]
each
the
importance.
Tang
the
domain.
weighting
perceptual
one
(6)
the for
ideas
mentioned
integrate
above the
advantages
in
the
follow-
of
wavelet
IEICE
TRANS.
FUNDAMENTALS,
VOL.E91-A,
NO.8
AUGUST
2008
1966
tree structure, sum-of-subsets for supertree selection, positive/negative modulation for watermark embedding and the CSF and NVF of the HVS into the WTGM. To quantify the existence of the watermark, the normalized correlation coefficient (NC) will be examined in order to identify the existence of the watermark. The formula of normalized correlation coefficient is as follows:
Nw
equals
be
to
3)
The by
Huffman
the
size
would
data
Since
the
The coefficient value is within -1 and 1. The complete design of the proposed algorithm is summarized as following:
4)
For
each
watermark
a)
Select
b)
Choose ƒ¿.
c)
If
bit
wi
(i=0
to
Nw-1)
do
to
for
is
originally
denotes
the
we
ployed, 5) ƒÀk is
EA,
ith
consisting
of
n trees.
EB
,t=ƒÆi,t*(1+ƒ¿*ƒÀk*ƒÁkx,y) i=p,...,q.
ii) Įi,t=Įi
for (PM
for
IfƒÀk=1
i=p,...,q.
for
(NM
for
tree
7)
A)
ing
t=(n/2),...,n-1,
sub-super
The
tree
B)
the
readers
could
detailed
infor-
use,
there like
PGP
[16]
that
lets
indi-
extremely
are
free
strong
en-
change
difference,
required
i.e.,
after
to enthe
modand
modification).
If
the
HVS
is em-
for the strength of the embedding parameter the
NVF
watermark. and ƒÁkx ,y=1parameter where
embedding
the
is used.
the
CSF
the
the is not
NVF
HVS
employed.
employed.
super
embedding
is not
employed.
is not of
tree
list
procedure
generator algorithm Most pseudo-random quences
,t=ƒÆi,t*(1-ƒ¿*ƒÀk*ƒÁkx,y) and
ii) Įi
for
i=p,...,q.
(NM
for
i=p,...,q.
for (PM
for
mon
t=0,...,(n/2)-1,
sub-super
,t=ƒÆi,t*(1+ƒ¿*ƒÀk*ƒÁkx,y) and
tree
A)
will
but
the
be
stored
random
is not necessary to generator algorithms
tree
B)
Blum
Shub, it is very
tions.
dom
number
Pass
various
back
the
the
modulated
modified
verse
DWT
The
watermark
The
length
of
The
max
wavelet
to obtain
trees
to their
coefficients
original
posi-
through
a watermarked
are of
uniformly
these
distributed
algorithms
generators, lagged Fibonacci shift registers, generalized
t=(n/2),...,n-1,
sub-super
which classes
fore,
Arrange
6)
the
information the
data
have
dur-
number
be recorded. produce se-
else i) Įi
5)
after
and ƒÁkx,y=1,
If ƒÁkx,y=1,
t=0,...,(n/2)-1,
sub-super
,t*(1-ƒ¿*ƒÀk*ƒÁkx,y)
and
is (5)
If ƒÀk=1,
con-
the
need |(E'A-E'B)/(EA+EB)|•†ƒ¿(E'A
it stands the CSF
formula
then
and
d)
tree
6)
(wi=-1)
i) Įi
super
the
keys.
fractional
energy
of
files system
with
long
the
required
ification, E'B are
and
more
decrypt
de-
encryp-
doesn't
Interest
documents
and
authenticity
encode
for
encryptions
their
cryptography
change
practical
and
inissue
Data
who
[15]
For
to encrypt
and
secret
encryption and
them.
application.
algorithms
of
of
efficiently
study
a public-key
tool
and
research
anyone
unscramble
secure
cryption
force
by
cryptography
NVF(x,y) the
read
any further
is a critical
systematically can
will
small.
communication.
data
be
available
viduals
4) ƒ¿
secret
key
which
secure
be
compression
important
The
which
the
the
tools
the
K
without
K can
transmission
extraction.
can't
mation
is
confidentiality
they
refer
K data
guarantee
of
key
zip
to
algorithms
proper
WTGM Watermark Embedding:
or
key
bytes
comparatively
key
for
image
4608
image
algorithms
tion
so
of
advanced
is needed
the
is
the
data
tents
1536,
coding be
secure
watermark
cryption
generator and group them in various super trees. Each super tree should be divided in two sub-super trees such that EA=EB. Store this group information which we call the image key K.
image the
studies
of which
amount
reduced
formation,
(7)
value bits
compression.
for
1) Generate a seed by mapping a signature/text through a one-way deterministic function. Obtain a PN sequence Wof length Nw using the seed. 2) Compute wavelet coefficients of a host image. Group the coefficients to form trees. 3) Randomly arrange the trees using some pseudorandom
the
12•~2•~1536
the
in-
image.
super
Fortuna,
and
flexible
for
generator trees
under
to
are
[17] linear
and
com-
congruential
generators, feedback shift
linear feedback registers, Blum
the
twister.
Mersenne
WTGM arrange the
principle
to apply the
any
wavelet of
Theregood
ran-
trees
into
sum-of-subsets.
WTGM Watermark Extraction
Note: 1) 2)
trees.
W
under
4 level
mark
bit
of NM,
is
a super
the
is a binary watermark
value wavelet
WTGM
is
tree
(212=4096•†1536•~2).
key
K
ing
information
needs
using for at
least
number for
one PM
and 12
of •}1.
bits the
Since
water-
each
tree
the
other
is
to
mark
each
recording
sum-of-subsets
super image
super
bits
for
of
a 512•~512
Therefore,
12•~2•~Nw under
Nw=the
decomposition.
used
needs
sequence
of Nw=1536
embedded tree
PN
where
half
used
for super
the
image
the
order-
principle.
1) Generate a seed by mapping a signature/text through a one-way deterministic function. Obtain a PN sequence Wof length Nw using the seed. 2) Compute wavelet coefficients of a host image. Group the coefficients to form trees. 3) Reorganize the trees using the image key K. 4) For each watermark bit wi (i=0 to Nw-1) do
If
a) Select the ith super tree consisting of n trees. b) Calculate EA and EB. c) If (EA>EB) then wi=-1.
TSAI and SHEN: DIFFERENTIAL
ENERGY
BASED WATERMARKING
ALGORITHM 1967
else wi=1. 5)
Compute
6)
If ƒÏ
the
is
normalized
above
the
otherwise,
5.
mark.
Experiment
correlation ƒÏ.
threshold ƒÏT,
it does
not
Without
tion
the
watermark
W
rate
is
artifacts
exists;
ment
exist.
in the of
the
watermarked
(as
shown
Results
evaluate
the
performance
512•~512
Lena,
bits/pixel
resolution
a four-level length the
trees
part
used
to relatively DWT) scheme. 6-85
In
p=5,
order
[4]
of
sentative WTQ meet
we
and
length
Nw=512,
a false
the
used
in
is the
CDF
9/7
5.1
Visual
From
this
5,
study
filters
the
different
image
the
same.
Compared
ages
demonstrate and
the
WTGM(S2) quency
are
responds ure
Table
the
to
6(c)
1
uses
the
of
strength
of
why
the
HVS
watermark
is
im-
so that
the
first
4 of WTQ
coefficient
num-
to relatively
high-
all
the
(a
(b
(c
(d
shown
typically
repre-
compare
and
water-
values
the
with
is
for
the With
of NC
is chosen
as
in
watermark to be The
tree
to Lena,
same
1.
used
the
strength)
39.8dB
0.23
Fig. 5 Watermarked images and error images. (a) WTGM(S1) watermarked Lena image at PSNR=38.2dB. (b) Scaled error image between (a) and the original image. (c) WTGM(S2) watermarked Lena image at PSNR=38.2dB. (d) Scaled error image between (c) and the original image.
wavelet
watermarking
in WTQ.
parameter
errors
1-21
and
will
The
embed used number
settings
5(d),
the
(S1)
in
for Lena,
Goldhill
high
fre-
image.
6(b)
scheme. the
and Peppers
(b
(c
(d
images uses
which
embed
(a water-
Lena
WTQ to
im-
different
watermark, the
im-
different.
more
Figure
6-85
at
error
are
watermarked
the
result kept
watermarked
under
38.2dB.
is
the
(S2)
have
quality
of
subbands
coefficient
and
will
PSNR
watermarked
visual
to
the
between
WTGM(S1)
values
The parameter
5(b)
image
the
setting
even
setting
settings.
PSNR
the
the
wavelet
Figs.
by
than
number
3 and
1.03•~10-7.
while
by
6 shows
with
efficient
different
quality
parameter
all
intensify
example
uses
2,
(watermark
also
another
Comparison
original
signals
the are
watermarked
Figure marking
for
6(d)).
is
NM.
1 (S1))
Table
of
of rate
8
The
as
setting
in
which
two
in
ages
the
shown
quality
modulation
of
same
To
38.7
probability
Quality
Fig.
38.2,
obvious employ-
corresponds
PSNR
it is
of ƒ¿
The visual
larger
modula-
DWT).
same
threshold ƒÏT
positive
filters
value
since as
for
comparison,
approach.
Fig.
the
it has
the are
a rectangle.
improves even
even there
half
(level the
2 of
since
of
Peppers
respectively,
at the
the
values
WTQ,
fair
set
used parts.
uses
1 and
based
set
is
the
6 trees,
Set
corresponds
algorithm tree
PSNR
Goldhill
be
WTQ
wavelet
the
for
make
of
q=20)
WTGM(S2)
(level
will
scheme,
p=0,
q=84)
to
images
in
part
components
marked
two
which
second
(i.e.
frequency
are
into
components
watermarking,
The
others
with
apparently image,
7
We
marked
HVS, 0.378),
employ
sequence
Parameter
(i.e.
low-frequency
for
the
region
and
the with
We
consists
divided
1-21
images
a watermark
tree
(Watermarking
number
method,
watermarking.
and
and
are
WTGM(S1)
ber
PM
proposed
Peppers
for
a super
for
the
and
used
transform
experiments
coefficient
as
are
Therefore,
are
The
of
Goldhill
wavelet
512.
in
Figure
to the
(ƒ¿=0.177
HVS
the
portant. To
consideration small
cocorFig-
water-
images.
Fig. (a)
6
Close-ups
Original
0.177). WTGM(S2)
(c)
image.
for
comparison
(b)
WTGM(S1)
WTGM(S2) watermarked
with
watermarked with
visual
effects
watermarked
HVS
Lena
without
(ƒ¿=2.131).
(PSNR=38.2dB).
Lena HVS
without
HVS
(ƒ¿=0.378).
(ƒ¿= (d)
IEICE TRANS. FUNDAMENTALS,VOL.E91-A, NO.8 AUGUST 2008 1968
Table
2
Watermarks
extracted
from JPEG
compressed
watermarked
images.
(a)
(b)
5.2 (c) Fig.
7
(a)
WTGM(S2)
Test
WTGM(S2)
visibility
of embedding
watermarked watermarked
watermarked marked
on
(d)
Barbara
Barbara
Fig. 8
Lena Lena
without
with
HVS
with HVS
of watermark without HVS
(PSNR=25.0dB).
HVS
(ƒ¿=1.731).
(ƒ¿=9.741).
(ƒ¿=0.872).
(d)
(c)
(b) WTGM(S2)
WTGM(S2)
water-
(ƒ¿=3.374).
(a)
(b)
(c)
(d)
Close-ups for comparison with Figs. 7(a)-(d).
quality of watermarked image will be as low as 25dB for comparison purpose. From these results, we can see that there are obvious artifacts in the regions near the shoulder in Fig. 7(a) and the foot of the table in Fig. 7(c). The HVS can effectively decrease the visibility of the watermark (as shown in Figs. 7(b) and (d)). Figures 8(a)-(d) are the closeups of the images in Figs. 7(a)-(d).
Common Image Processing Attacks
1) JPEG CompressionAttacks In this experiment, we perform JPEG compression with different quality factors (QF) on the watermarked image. The extracted results and NC values are depicted in Table 2. From these results, we can see that the proposed algorithm is robust to JPEG compression. For all cases, the extracted watermarks are with relatively high-NC values. The result of WTGM(S1) is superior to that of WTGM(S2). Even for the case that QF is equal to 20, we can still detect the embedded watermark. Since the setting for S2 reserves the watermark in the level 1 component, JPEG intentionally removes the high frequency components which make setting S1 perform better than setting S2. Therefore, the results from Table 2 are reasonable. 2) SPIHT CompressionAttacks SPIHT (Set Partitioning in Hierarchical Trees) is an imageecompression algorithm that exploits the inherent similarities across subbands in a wavelet decomposition of an image. It implies uniform quantization and bit allocation applied after wavelet decomposition. Table 3 shows the extracted tracted NC values and corresponding PSNR values between original image and attacked image. From these results, we can see that the proposed algorithm can tolerate the incidental distortions induced by high-quality SPIHT compression. Since SPIHT first removes the high frequency components during the rate reduction, the results of WTGM(S1) is also superior to those of WTGM(S2). 3) JPEG2000 CompressionAttacks JPEG2000 [18] is a new image compression standard which has good performance in high bit rate coding. It adopts wavelet transform instead of discrete cosine transform to utilize the intersubband correlation. Table 4 shows the extracted NC values and corresponding PSNR values between original image and attacked image. Since there is no data from WTQ results under JPEG2000 attack, the results under SPIHT attack are shown for comparison purpose. From these results, we can see that the proposed WTGM al-
TSAI
and SHEN:
DIFFERENTIAL
ENERGY
BASED
WATERMARKING
ALGORITHM
1969
Table 3 Watermarks extracted from SPIHT compressed watermarked images. (a) Lena. (b) Goldhill. (c) Peppers.
Table 5 Watermarks extracted from spatial-domain-attacked watermarked images. (a) Lena. (b) Goldhill. (c) Peppers .
(a)
(b)
(a)
(c)
Table 4 Watermarks extracted from JPEG2000 compressed watermarked images. (a) Lena. (b) Goldhill. (c) Peppers.
(b)
(a)
(b)
(c)
(c)
gorithm can tolerate the incidental distortions induced by JPEG2000 compression. Since JPEG2000 first removes the high frequency components during the rate reduction, the results of WTGM(S1) is also superior to those of WTGM(S2) which has similar performance as shown in Table 3.
4) Spatial-Domain Image Processing Attacks Several spatial-domain image processing techniques, including histogram equalization, image cropping, brightness enhancement, contrast enhancement, median filtering, Gaussian filtering, sharpening, and rescale are performed on the watermarked image. The extracted results are depicted in Table 5. For all cases, the watermark information therein can be successfully recognized. Especially for those cases of histogram equalization, Gaussian filtering and sharpening, the result of WTGM(S2) is superior to that of WTGM(S1). Except for the case of Peppers Gaussian filtered image, the proposed algorithm can outperform the
IEICE
TRANS.
FUNDAMENTALS,
VOL.E91-A,
NO.8
AUGUST
2008
1970
Table
6
Watermarks
extracted
from shifted
watermarked
images.
Table 8 Watermarks extracted from multiple watermarked Lena. (b) Goldhill. (c) Peppers.
images.
(a)
(a)
Table
7
Watermarks
extracted
from rotated
watermarked
images.
(b)
(c)
5.4
Security
Measurement
1) Multiple
Watermarking
For ply
one
group tector WTQ
scheme
with
relatively
high-NC
values.
the
Geometric
Attacks
or
results
of
the
PSNR
Pixel
Shifting
This cularly.
6.
is
for image.
that
of the
the
functions.
attack
for
the
pixels
left.
attacks
as
shown of
13 pixels
to
12
Gold-
rate
up
to
images.
size.
and
can
and
domain.
We
3•‹ for
that
Goldhill
can
be
image
we
is
aptree
the de8 shows
through can
fallen
see
into
mul-
that
even
25dB,
the
detected.
removal WTQ
is
can
resist
WTGM(S2),
ues
of
of
We
perform
this
which
reduces
subbands,
images.
and
one
scheme.
embedded
watermarked rithm
than
rotate
7
Table and
the
9 shows
8 bitplanes
images
are
strategies
that
Under fallen
impact
on
proposed for
26
algo-
WTGM(S1)
the
and
to
designated
the
the
which
into
used
attack
removed
respectively.
attacked
major
PSNR
val-
29dB.
shown
and
is
described
a geometri-
can 2.5•‹
for
The
sis.
watermarked
in Table
Complexity
of
Lena
is
WTGM
with
The
complexity
also
whole
transform,
Human
Vision
System
low
from
of WTGM the
complexity
view
should
sum-of-subsets,
with
of be
CSF
Human
Vision
mathematical discussed
and
NVF
analyfor
wavelet
calculation
re-
spectively.
7. From resist
computation
System
counter-clockwise
WTGM(S2)
image
5.5
scaled
software
is the
a small
the
the
scaling
and are
the
by
[19]
it provides
rotation
results
see
image cropping
StirMark
to 3•‹ in clockwise
extracted
we
the
image,
since
the
the
attacked
to disturb Table
attacked
results,
may
wavelet
Scaling)
rotating
attack
spatial
The
and
by
on
these
attacker
same
attempt watermark.
images
From of
an
the
the
Removal
Bitplane defeat
in Taup
for
modulation
Bitplane
cir-
Apparently
a shift
and
lower
image
This
0.25•‹
results, of
this
in the
from
directions.
Peppers
the
resist
images has
rotated
original
testing
tation
such
2)
shifting to
can
(Rotation done
the
here
these
former
is
scaling
image
Peppers
the
Attacks
adopted
cal
pixels
to resist
and
attack
to
the
by
latter.
The
image
shift
Shift)
done
WTGM(S2)
For
Rotation
angle,
is
unable
Lena
hill
(Circular
attacks
we
Contrarily,
pixels
2)
of
Here,
WTGM(S1) ble
Attacks
kind
watermarked
value
all,
using
technique in the embedded
the
still
to
watermarks
watermarking.
watermark 1)
well-known
more
modulation or to destroy
tiple 5.3
algorithms
a roand
Suppose (high-pass) and
assume
CDF
9/7
the for
M•†N. filters
synthesis
wavelet
filters
are
transform. The
is 4(N+M)+2
cost
h
(low-pass)
and
g
Take |h|=2N, |g|=2M, of
the
and
standard could
be
algorithm speeded
for up
by
TSAI
and SHEN:
DIFFERENTIAL
ENERGY
BASED
WATERMARKING
ALGORITHM
1971
Table 9 Watermarks extracted from bitplane-removed ages. (a) Lena. (b) Goldhill. (c) Peppers.
watermarked im-
Table 10
Summary of WTGM with WTQ schemes .
(a)
(b)
by
the
the
window
local
mean
is O(l2),
l(=2L+1)
window
size
is
of
use
ance
NVF
since
image
width
tion
of
algorithm
wavelet
The
transform
problem
a real
sum-of-subsets
stead.
Empirical
[21]
get
such
plexity
an
CSF
weighting as
plementation tion from
about
and
the
linear-time
the
other
in the
hand,
DWT
in
the
Fig.
the
domain be
be
applied
by
the
energy
Therefore,
average
the
time
comif
R
quicksort-based
is employed associated
pre-calculated
for
to
apply
each of
well
subband CSF
can parameter
the
complexity
be pre-calculated is
decided.
by r(x,y)
the
NVF,ƒÅ(ƒÁ) look-up in
Eq.
and table
(6)
under
Intel
In
suitable
image
sub-
size
(we
global time
vari-
complex-
2
loop
of
seconds
to
practical
3.0GHz,
complete
the
for
WTGM
applications
simulation
WTGM
Pentium
conclusion,
for and
12
amount
than l. whole
than
comfrom
the
results.
gamma while
is determined
the
WTQ
In
as
other
is
shown
we
general,
WTGM(S2)
the
all
The
it provides WTGM
to
clearly
WTGM
is superior
with
be
compression
resisting
as
geometric
10). not
the
use
quantization
to
cryptanalysis-like
remove
categories
in
with can
SPIHT
ineffective
does
and
can
and
in Table
WTGM
useful
in almost
Also,
methods.
JPEG but
watermarks not
comwhich geomet-
components-WTGM(S1)
in resisting
(as
high-frequency other methods, processing,
cryptanalysis.
than
cryptanalysis,
the
WTQ
well
effect
addition,
relatively
is superior to common signal
resist as
effective
In bed
with
low-frequency
distortions.
in
WTGM
visual
as
im-
the coefficient multiplicacan be efficiently done
of
the
distortions
Therefore,
Regarding
shape
ric
more
linear-time.
function
general,
ponents-WTGM(S2) can effectively
a better
perceptual
complexity
total
(O(n2.l2+n2)=O(n2))
the
less
analysis
are
The
overall
the
variance
there
Thus,
the
larger
images.
study,
Summary
relatively
the
becomes table. This
5.6
In to
[21].
masking
the
in-
quick-
comparisons of
and
its
and
than O(n2)
this global
the
to
variance
of
on
tree
and
to
results).
related
with idea
based
Therefore,
in WTGM look-up
dealing
is low
mathematical
NP-
implementation
(2+2ln2)R
CSF
can 4.
is not
the
complexity on
plexity known
actually
easily.
only
function
shown
can
a
a sum-of-subsets
that
supertrees
arrangement
sorted is
On the
the
requires
selection
WTGM but
shows
in WTGM
is
the
extraction need
and
equals
store
n is much
testing
In the
subband
simulation,
will
512•~512
computa-
mathematics.
itself
However,
study
The
time
problem
problem
to order
are
to 2(N+M+2). is linear
[5].
sum-of-subsets sort
[20]
sum-of-subsets
complete
items
in
and
decomposition.
more
and
1GRAM lifting
no
our
embedding
the
to
is
mean
size.
Besides,
computation is
From
(c)
window
wavelet
array
which
of local
approximately
static
for
variance
L=1.
wavelet
takes O(n2)
ity
for
each
4 level
calculation
can
local
complexity is the
3•~3
for
after
the
The
is
obtained
bands
and
size.
the see from
watermark
that the
for
WTGM detailed
medium-high
in resisting
common
em-
attack
for
WTGM.
outperforms comparsion.
frequency signal
setting process-
IEICE
TRANS.
FUNDAMENTALS,
VOL.E91-A,
NO.8
AUGUST
watermarking
for
2008
1972
ing, geometric distortions as well as cryptanalysis with better visual perception than WTGM(S1). Due to the difference of watermark embedding location for setting S1 and S2, the results are expected compared with other wavelet based approaches. However, the weakness for the WTGM the tree combination information must be kept secret addresses extra storage space. The extended study working on the design to efficiently reduce this extra
is that which should cost
[2]
Lu
no.10, [3]
[4]
Langelaar
Process.,
S.H.
Wang
T.K.
C.S. marking
[8]
Tsai
[9]
J.L.
no.4, [10]
scheme,•h
Trans.
for
Process.,
Im-
copyright
vol.13,
no.2,
2004, Sze,
differscheme,•h
Feb. tree
2005.
quantization
2004.
Liao, •gCocktail
IEEE
tree
Trans.
July
group
IEEE
water-
Multimed.,
vol.2,
modulation
International
Processing,
IEEE
(WTGM)
Conference
vol.II, effects
of images,•h
on
pp. 173-176,
of a visual
Trans.
Inf.
2007.
fidelity
Theory,
cri-
vol.20,
1974. Tang, •gA
IEEE
H.Y.
Sakrison, •gThe
S.X.
pp. 768-775,
pp. 219-230,
and
protection,•h
Signal
encoding
and
robust
2000.
and D.J.
of optimal
a modified
no.2,
Shen, •gWavelet
pp. 525-536,
ing
Image
of wavelet
watermarking,•h
and
Huang
contrast-sensitive
Multimedia,
vol.13,
visible
no.2,
watermark-
pp. 60-66,
April-June
2006. [11]
L. Yong,
L.Z.
based
wavelets
on
vol.27, [12]
A.P.
Cheng,
no.11,
L.R.
perceptual
Z.H.
Xu, •gTranslucent
error-correct
Iyer,
masks
Digital
and
and
pp. 1533-1539.
Beegan,
Signal
for
code,•h
Nov. and
Bell, •gDesign
image
Processing
watermark
J. of Computers,
2004.
A.E.
wavelet
digital
Chinese
and
compression,•h
Workshop,
pp. 88-93,
evaluation
of
Proc.
10th
IEEE
IEEE
CS
Press,
2002. [13]
M.J.
Tsai
and
C.W.
watermarking
by
models,•h 1437, [14]
Trans.
S. Voloshynovskiy, approach Proc.
Dresden, B.
3rd
based
multipurpose
watermarks
with
Fundamentals,
Schneier,
A.
Herrigel,
to
content
Int.
color
human
image
vision
vol.E91-A,
Sept.
Applied
Code
in C,
PGP,
[17]
P.L'Ecuyer, •gUniform
N.
no.6,
Baumgaertner,
adaptive
Workshop
Germany,
[16]
system pp. 1426-
and
digital
Information
T. Pun, •gA
image Hiding,
watermarkpp. 211-236,
1999.
Cryptography:
Second
ed.,
Protocols,
John
Wiley,
Algorithms,
New
York,
and
1996.
http://www.pgp.com/downloads/freeware/index.html
erations [18]
dual
2008.
stochastic
[15]
Lin, •gWavelet
using
IEICE June
Source
1) The group information for trees needs to be kept for watermark extraction, which needs more storage space. 2) The tolerance for geometric attacks is sill insufficient, feature-based or other RST (Rotation, Scaling and Translation) invariant mechanisms can be taken into account for better synchronization.
C.H
the
B.B.
IWDC
Dec.
Speech
on
2001.
and
vol.53,
C.J.
image
image
Mannos
terion
ing,•h
On the other hand, there are still some issues needed to be further studied as following:
digital
Acoustics,
Jan.
energy
IEEE
quantization
Trans.
(DEW)
Huang,
and
digital
video,•h
J. Mitra, •gCryptanalysis
Process.,
pp. 209-224,
M.J. for
and
scheme,•h
for
vol.10,
differential
and
tree
IEEE
S. Maitra, •gCryptanalysis
S.K.
image
Process.,
2004.
Signal
and
Lu,
no.4,
pp. 148-158,
watermarking
Trans. Das
images
Lin, •gWavelet
S. Maitra,
watermarking [7]
Y.P.
Feb.
energy
T.K.
no.1,
watermarking,•h
Das,
IEEE
1) The proposed algorithm can tolerate more common signal processing and geometric attacks. 2) The length of the image key is large, which renders a better confusion/diffusion for security. 3) The human visual characteristics are considered in the wavelet tree based watermarking systems to provide a better visual quality. 4) The watermark can be public for users, and if any malicious user tries to destroy the watermark and sell those attacked copies, the user could be identified.
and
Image
Lagendijk, •gOptimal
encoded
vol.10,
Trans.
2001.
R.L.
of DCT
age
IEEE
Oct.
and
pp. 154-165,
[6]
Liao, •gMultipurpose protection,•h
pp. 1579-1592,
G.C.
ential
provides a better visual quality of the watermarked image. Compared with the WTQ scheme, the advantages of the proposed algorithm are as follows.
H.Y.M. and
protection
Conclusion
An efficient differential energy watermarking algorithm based on wavelet tree group modulation has been presented. In the proposed algorithm, the watermark is embedded in the relatively high-frequency components using the group strategy for each super tree such that energies of sub-super tree A and that of sub-super tree B are close. The employment of wavelet tree structure, sum-of-subsets and positive/negative modulation effectively improve the robustness of the watermark. The consideration to the CSF and NVF of the HVS
and
watermarking
[5]
6.
C.S.
authentication
random
Research,
vol.53,
JPEG
2000
compression,
JPEG
2000)
published
number
pp. 77-120, the from
generation,•h
Annals
of Op-
1994.
International ISO/IEC,
standard [Online]:
(IS
15444-1:
http://www.ece.
uvic.ca/mdadams/hasper/•` [19]
StirMark,
http://www.petitcolas.net/fabien/software/StirMarkBen
chmark_4_0_129.zip [20]
Acknowledgments
I. Daubechies
1 and
lifting
Journal
no.3,
1. This work was supported by the National Science Council in Taiwan, Republic of China, under NSC95-2416H009-027 and NSC96-2416-H009-015. 2. Partial technical background has been presented in the conference ICASSP 2007 [8].
References
[1]
I.J.
Cox,
J. Kilian,
spectrum cess.,
watermarking vol.6,
no.12,
F.T.
Leighton, for
and
multimedia,•h
pp. 1673-1687,
Dec.
T. Shamoon, •gSecure IEEE 1997.
Trans.
spread Image
Pro-
[21]
R.
steps,•h
pp. 247-269, Sedgewick,
Structures, dison
Wesley,
W. Sweldens, •gFactoring of Fourier
May
2001.
wavelet and
transforms
into
Applications,
vol.4,
1998.
Algorithms Sorting,
Analysis
Searching,
in
C, and
Parts Graph
1-5:
Fundamentals,
Algorithms,
3rd
Data ed.,
Ad-
TSAI and SHEN: DIFFERENTIAL
ENERGY BASED WATERMARKING
ALGORITHM 1973
Min-Jen Tsai received the B.S. degree in Electrical Engineering from National Taiwan University in 1987, the M.S. degree in Industrial Engineering and Operations Research from University of California at Berkeley in 1991, the Engineer and Ph.D. degrees in Electrical Engineering from University of California at Los Angeles in 1993 and 1996, respectively. From 1996 to 1997, he was a senior researcher at America Online Inc. In 1997, he joined the Institute of Information Management at the National Chiao Tung
University
search
interests
sic, digital
in Taiwan include
watermarking
puting for electronic Eta Kappa Nu.
and is currently
multimedia
system
and authentication,
commerce.
an associate web
services,
Dr. Tsai is a member
Chang-Hsing
professor.
and applications,
Shen
His re-
digital
foren-
enterprise
com-
of IEEE,
ACM,
and
has received B.S. de-
gree in information management from National Central University in 2000, the M.S. degrees in Institute of Information Management at the National Chiao Tung University in the year 2006. From year 2002 to 2003, he was in the development team of anti-virus service at Trend Micro. He later joined Inventec Besta in 2006 and focuses on digital entertainment and learning of mobile device.