Document Type : Research Article

Authors

Abstract

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chromosomes and GA operators (e.g. selection, crossover, mutation and elitism), are used to find the nearly optimal embedding positions. A fitness function, which includes both factors related to transparency and robustness, is used to assess and compare chromosomes. The watermarked test images do not show any perceptual degradation. This approach supports scalable watermark detection and provides robustness against progressive wavelet image compression. The experimental results very efficiently prove the robustness of the approach against progressive wavelet image coding even at very low bit-rates and some other attacks. This approach is a good candidate for providing efficient authentication for secure and progressive image transmission applications especially over heterogeneous networks, such as the Internet.

Keywords

[1] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann, 2nd edition, 2008.
[2] I.J. Cox and M.L. Miller. A Review of Watermarking and the Importance of Perceptual Modeling. In Proceedings of the International Conference on Electronic Imaging (SPIE'97), San Jose, CA, USA, 1997.
[3] N. Cvejic. Algorithms for Audio Watermarking and Steganography. PhD thesis, University of Oulu, Oulu, Finland, 2004.
[4] F. Hartung and M. Kutter. Multimedia Watermarking Techniques. Proceedings of the IEEE, 87(7):1079-1107, 1999.
[5] G.C. Langelaar, I. Setyawan, and R.L. Lagendijk. Watermarking Digital Image and Video Data. A State-of-the-Art Overview. IEEE Signal Processing Magazine, 17:20-46, 2000.
[6] V.M. Potdar, S. Han, and E. Chang. A Survey of Digital Image Watermarking Techniques. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN'05), pages 709-716, Perth, Australia, August 2005.
[7] C. Shoemaker. Hidden Bits: A Survey of Techniques for Digital Watermarking, Spring 2002. Available at http://web.vu.union.edu/~shoemakc/watermarking/watermarking.html.
[8] I.J. Cox and M.L. Miller. The First 50 Years of Electronic Watermarking. EURASIP Journal on Applied Signal Processing, 2002(2):126-132, 2002.
[9] S. Craver, N. Memon, B. Yeo, and M. Yeung. Resolving Rightful Ownerships with Invisible Watermarking Techniques Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications, 16:573-586, may 1998.
[10] H. Danyali and M. Deljavan Amiri. A Mltiresolution Robust Watermarking Approach for Scalable Wavelet Image Compression. In Proceedings of the 11th International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS'08), volume 5259 of Lecture Notes in Computer Science, pages 57-66, Juan-les-Pins, France, October 2008. Springer-Verlag Berlin Heidelberg.
[11] H. Danyali and M. Deljavan Amiri. A Scalable Blind Watermarking for Progressive Image Transmission. In Proceedings of the 5th Iranian Conference on Machine Vision and Image Processing, Tabriz, Iran, 2008.
[12] P. Kumsawat, K. Attakitmongcol, and A. Srikaew. A New Approach for Optimization in Image Watermarking by Using Genetic Algorithms. IEEE Transactions on Signal Processing, 53(12):4707-4719, dec. 2005.
[13] R. Dugad, K. Ratakonda, and N. Ahuja. A New Wavelet-Based Scheme for Watermarking Images. In Proceedings of the 1998 IEEE International Conference on Image Processing (ICIP'98), volume 2, pages 419-423, Chicago, Illinois, USA, oct. 1998.
[14] V. Aslantas. A Singular-Value Decomposition-Based Image Watermarking Using Genetic Algorithm. AEU - International Journal of Electronics and Communications, 62(5):386-394, may 2008.
[15] M. Ketcham and S. Vongpradhip. Intelligent Audio Watermarking Using Genetic Algorithm in DWT Domain. International Journal Of Intelligent Technology, 2(2):135-140, 2007.
[16] F.Y. Shih and Y. Wu. Robust Watermarking and Compression for Medical Images Based on Genetic Algorithms. International Journal of Information Sciences, 175(3):200-216, October 2005.
[17] D. Lee, T. Kim, S. Lee, and J. Paik. Genetic Algorithm-Based Watermarking in Discrete Wavelet Transform Domain. In Proceedings of the International Conference on Intelligent Computing (ICIC'06), volume 4113 of Lecture Notes in Computer Science, pages 709-716, Kunming, China, 2006.
[18] J.H. Holland. Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor, MI, USA, 1975.
[19] D.E. Goldberg. Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, Reading, Massachusetts, USA, 1989.
[20] N.J. Jayant, J. Johnson, and R. Safranek. Signal Compression Based on Models of the Human Perception. Proceedings of the IEEE, 81(10):1385-1422, 1993.
[21] Y.K. Chee. Survey of Progressive Image Transmission Methods. International Journal on Imaging Systems and Technology, 10:3-19, 1999.
[22] J.M. Shapiro. Embeded Image Coding Using Zerotree of Wavelet Coefficients. IEEE Transactions on Signal Processing, 41(12):3445-3462, 1993.
[23] A. Said and W.A. Pearlman. A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees. IEEE Transactions on Circuits and Systems for Video Technology, 6(3):243-250, June 1996.
[24] M. Charrier, D.S. Cruz, and M. Larsson. JPEG2000, the Next Mmillenium Compression Standard for Still Images. In Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems (ICMCS'99), pages 131-132, Florence, Italy, 1999.
[25] B.G. Haskell, P.G. Howard, Y.A. LeCun, A. Puria, J. Ostermann, M.R. Civanlar, L. Rabiner, L. Bottou, and P. Haffner. Image and Video Coding-Emerging Standards and Beyond. IEEE Transactions on Circuits and Systems for Video Technology, 8(7):814-837, 1998.
[26] D. Lee, T. Kim, S. Lee, and J. Paik. A Robust Watermarking Algorithm Using Attack Pattern Analysis. In Proceedings of the 8th International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS'06), volume 4179 of Lecture Notes in Computer Science, pages 757-766, Antwerp, Belgium, September 2006.
[27] P. Tsai, Y. Hu, and C. Chang. A Progressive Secret Reveal System Based on SPIHT Image Transmission. Signal Processing: Image Communication, 19(3):285-297, 2004.
[28] P. Tsai, Y. Hu, and C. Chang. Using Set Partitioning in Hierarchical Trees to Authenticate Digital Images. Signal Processing: Image communication, 18(9):813-822, 2003.
[29] S.A.R. Jafri and S. Baqai. Robust Digital Watermarking for Wavelet-Based Compression. In IEEE 9th Workshop on Multimedia Signal Processing (MMSP'07), pages 377-380, Chania, Crete, Greece, October 2007.
[30] M. Barni, F. Bartolini, and A. Piva. Improved Wavelet-Based Watermarking through Pixel-wise Masking. IEEE Transactions on Image Processing, 10:783-791, 2001.
[31] A.Q. Zaid, A. Makhloufi, and A. Bouallegue. Wavelet Domain Watermark Embedding Strategy Using TTCQ Quantization. International Journal of Computer Science and Network Security (IJCSNS), 7(6):165-170, June 2007.
[32] K.M. Parker and J.E. Fowler. Redundant Wavelet Watermarking with Pixel-wise Masking. In Proceedings of the IEEE International Conference on Image Processing (ICIP'05), volume 1, pages 685-688, Genova, Italy, 2005.
[33] A. Makhloufi, A.Q. Zaid, R. Bouallegue, and A. Bouallegue. Watermark Integration to Wavelet Image Coding Scheme. In Proceedings of the 8th IEEE International Symposium on Multimedia (ISM'06), pages 685-689, San Diego, CA, USA, 2006.
[34] M. Antonini, M. Barlaud, P. Mathieu, and I. Daubechies. Image Coding Using Wavelet Transform. IEEE Transactions on Image Processing, 1:205-220, 1992.
[35] M. Gen and R. Cheng. Genetic Algorithms and Engineering Design. Wiley, New York, NY, USA, 1997.
[36] Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing, 13(4):600-612, Apr. 2004.
[37] Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli. The SSIM Index for Image Quality Assessment, Nov. 2010. Available at http://www.ece.uwaterloo.ca/~z70wang/ research/ssim/.
[38] H. Danyali and A. Mertins. Highly Scalable Image Compression Based on SPIHT for Network Applications. In Proceedings of the 2002 IEEE International Conference on Image Processing (ICIP'02), volume 1, pages 217-220, Rochester, NY, USA, 2002.
[39] H. Danyali and A. Mertins. Flexible, Highly Scalable, Object-Based Wavelet Image Compression Algorithm for Network Applications. Vision, Image and Signal Processing, IEE Proceedings, 151(6):498-510, 2004.