Table of Contents
Advances in Computer Engineering
Volume 2014, Article ID 580697, 8 pages
http://dx.doi.org/10.1155/2014/580697
Research Article

An Improvement Technique Based on Structural Similarity Thresholding for Digital Watermarking

1Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, BC, Canada V6T 2G9
2Department of Electrical and Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran
3Department of Electrical and Computer Engineering, Yazd University, Yazd, Iran
4Department of Electrical and Computer Engineering, University of Tehran, Tehran, Iran

Received 29 July 2014; Revised 3 December 2014; Accepted 4 December 2014; Published 18 December 2014

Academic Editor: Ying-Tung Hsiao

Copyright © 2014 Amin Banitalebi-Dehkordi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Digital watermarking is extensively used in ownership authentication and copyright protection. In this paper, we propose an efficient thresholding scheme to improve the watermark embedding procedure in an image. For the proposed algorithm, watermark casting is performed separately in each block of an image, and embedding in each block continues until a certain structural similarity threshold is reached. Numerical evaluations demonstrate that our scheme improves the imperceptibility of the watermark when the capacity remains fixed, and at the same time, robustness against attacks is assured. The proposed method is applicable to most image watermarking algorithms. We verify this issue on watermarking schemes in discrete cosine transform (DCT), wavelet, and spatial domain.

1. Introduction

The rapid growth of the Internet and multimedia technologies has revealed the need for the copyright protection and the proof of the ownership of digital documents [1]. In particular, with images widely available on the Internet, digital watermarking is a common way of identifying images and protecting them from unauthorized usage in online advertisements. In this regard, the most important characteristic of watermark casting is its imperceptibility, where a certain degree of the statistical invisibility of the embedded watermark is required. In addition, in most watermarking techniques, it is desirable to embed messages with appropriate length so that the accurate extraction is assured, and at the same time, the embedded watermark should be perceptually invisible and robust to common signal processing and intentional attacks. Thus, there exists a trade-off between the imperceptibility, capacity, and robustness of the watermarking methods [2].

Broadly, watermarking techniques are divided into two categories: (i) spatial domain watermarking and (ii) transform domain watermarking. Spatial domain watermarking approaches, where the mark is directly embedded into each pixel of the host image, benefit from the advantages of a low degree of complexity and delay [35]. In addition, the temporal/spatial localization of the watermark in the spatial domain watermarking schemes is automatically achieved. This permits a better characterization of the distortion introduced by the watermark and reduces the annoying effects. In transform domain watermarking techniques, however, the watermark is inserted into the coefficients of a digital transform of the host asset [6, 7], for instance, Barni’s work [6] on watermarking using the discrete cosine transform (DCT) and the discrete Fourier transform (DFT). Of interest is to embed the watermark in the host image using the wavelet domain transform [8]. Authors in [9] utilize a DCT domain watermarking technique for copyright protection of digital images. They propose a watermarking method with dual detection where a pseudorandom sequence of real numbers, as a watermark, is embedded in a selected set of DCT coefficients. Jayalakshmi et al. [10] utilize the multiresolution dependency of the coefficients of contourlet transform for image watermarking. Generally, transform domain watermarks exhibit a higher robustness to attacks than the spatial domain watermarking schemes. More imperceptibility of the embedded watermark can be achieved by avoiding the changes into low frequency components of the host image. Complexity of this type of embedding might be higher than the complexity of the spatial domain watermarking methods. This issue introduces a trade-off between the robustness and the complexity when using the transform domain watermarking schemes.

Mean squared error (MSE) is one of the quality measures that has been widely utilized in various watermarking schemes due to its low complexity and ease of usage. However, it is shown that visual systems designed based on the usage of the MSE criterion cannot completely track the human visual perception with high reliability and accuracy [11]. The above challenge motivates us to propose a new technique for improving digital watermarking algorithms. Our scheme utilizes the structural similarity (SSIM) as a quality criterion instead of common measures such as the MSE metric. In the proposed scheme, the watermark embedding process is performed on each block of the host image until a certain threshold of the SSIM in quality is achieved. The insertion of the watermark sequence in the host image is performed based on an adaptive procedure. The length of the embedded watermark in a loop is increased until a certain threshold of quality is achieved. The stop condition for the watermark insertion process in each block of the image is specified by the SSIM threshold. On one hand, each block for the above process should be big enough to allow the SSIM to efficiently extract local structural similarities, and on the other hand, blocks with larger sizes may increase the complexity.

Numerical results show that the block size of 32 × 32 yields a lower computational complexity in several algorithms. Our algorithm is numerically tested for various watermarking schemes in the spatial (pixel) domain as well as DCT and wavelet domains. In our simulations, the conventional watermarking methods in the DCT, wavelet, and spatial domains are modified so that the capacity is maximized, while the watermarking imperceptibility remains fixed. Since our scheme does not change the original way that the watermark is being embedded, it is applicable to many of the watermarking algorithms.

The rest of the paper is organized as follows: in Section 2, the structural similarity theory is briefly reviewed. Section 3 describes the proposed optimization method. Section 4 shows the results of numerical experiments. Finally, in Section 5, an overview of the results is presented.

2. Structural Similarity

Natural images are highly structured; that is, there exists a high degree of local correlation between the pixels. To extract the local structural similarity, we follow the primitive formulation of SSIM [11], in which the target application is quality assessment of natural images. The original and distorted images, denoted by and , respectively, are decomposed to their luminance, contrast, and structure components as follows: where () and () represent the local sample means and standard deviations of , respectively, and denotes the sample cross correlation of and after subtracting their means. In addition, , , are small positive constants that stabilize each term, so that near-zero sample means, variances, or correlations do not lead to numerical instability. The local structural similarity (SSIM) is formulated as [11]

The SSIM metric between the original and the reference image pair is calculated by averaging the local SSIM, , over the image.

3. Improvement Technique

As mentioned, regardless of the watermarking algorithm that we would like to improve, the enhancement procedure is performed on each block separately. In each block of the host image, watermark casting is performed via an adaptive procedure exactly the same as the original algorithm that we are modifying, no matter what method is being used for the watermark embedding. To assure the imperceptibility of the mark, the embedding process of the watermark in each block is divided into several steps, and the embedding continues until a certain threshold on the similarity between the primitive block and the current watermarked block is achieved. The above process is performed on all the blocks until the watermarked image is obtained (see Figure 1). To verify the performance of this approach and compare with the nonmodified algorithms, we embed the sequence generated by the concatenation of the sequences that have been embedded in all blocks using the proposed method. Thus, the same sequences are embedded using the original and the improved algorithms. In this way, the capacity remains constant and therefore the imperceptibility can be compared for both methods. Since the type of watermark casting (e.g., in spatial, DCT, or wavelet domain) is not changed, the robustness will remain almost unchanged. To get more insight into the proposed watermarking algorithm in Figure 1, we summarize the steps of this figure as follows.

Figure 1: Flowchart of the proposed watermarking algorithm.

Step 1. Divide the asset image () into blocks, where a suitable value of is selected empirically to reduce the computational complexity. For our algorithm, an efficient value of is 32 for the sake of the complexity reduction.

Step 2. Set , name the th block of as “block,” and define = block. will be the th block after the watermark insertion.

Step 3. For a specific watermarking algorithm, embed the watermark sequence in “block” to create .

Step 4. Compute the SSIM between “block” and . If this similarity is greater than a prespecified threshold thr2, then go to Step 3 and embed a new watermark sequence in “block.” The new watermark has a bigger length when compared to the previous watermark. Watermark is usually a sequence of random bits. The new mark is the concatenation of the previous mark and new random bits, where is chosen corresponding to the watermark casting algorithm. If the mark is an image, the new mark can be a higher resolution image. For the least significant bit (LSB) watermarking, the previous mark would be the th left-sided bits of the mark image, while the new mark would be the th left-sided bit planes.

Step 5. Repeat Step 4 until the SSIM becomes less than thr2.

Step 6. Once the SSIM value is less than thr2, the current is the ultimate marked block of the watermarked image. Save this block, set , and reset to the next block. Then go to Step 4 and perform the same process for the next block of A.

Note that the iterative block embedding procedure is repeated for all of the blocks of the original image. Then, the output of the algorithm would be the watermarked image . The proposed algorithm leads to an optimum watermark embedding in the sense that, by adjusting the threshold value, one can directly tune the imperceptibility and the capacity. According to Figure 1, the structural similarity based method offers an adaptive embedding procedure that embeds the watermark sequence until a certain threshold for the imperceptibility is achieved. Clearly, less threshold values result in a higher capacity but less invisibility. Another advantage of the proposed method is that the scheme is robust against most of the intentional and unintentional attacks. As we will show in Section 4, for most of the watermark casting algorithms our scheme can extract the true watermark sequence with a higher accuracy than each original algorithm.

4. Numerical Results

This section presents some numerical evaluations for the proposed watermarking algorithm, where we use the Lena image as asset. The proposed method has been examined by modifying four watermarking schemes described briefly in the subsequent sections. Afterwards we will state our innovation. In our simulation, the threshold thr2 for SSIM is empirically set to 0.8.

4.1. Pixel Domain Embedding: LSB Watermarking

For the original LSB algorithm, watermark is an image which is embedded in another host picture. For each pixel, the left-sided bit planes of the mark image are replaced with the right-sided bits of the asset. In this way, most significant bits (i.e., important information) of the watermark image are replaced with the least significant bits (or details) of the host image. Within an adaptive process, in each time slot, a bit plane is added to the embedding bits of the watermark image block. The embedding process is stopped when the threshold is reached or all bits are embedded. As previously mentioned, the embedding process is performed adaptively in each block.

4.2. DCT Domain Embedding: Barni’s Method [12]

For the original algorithm described in [12], the watermark is a sequence of random bits placed in an additive form to the DCT coefficients of the host image as follows: where is the embedding sequence, and are the DCT coefficients of the host and the watermarked images, respectively, and is a parameter to adjust the watermark power. For a better comparison with our method, the visual masking effect (i.e., the extra stage for improving the imperceptibility) is turned off in both the original and the proposed blockwise algorithm. The same steps are done for the proposed algorithm; the only difference is that the embedding process is performed on each single block separately. In comparison to the original method, the watermarking sequence length is much smaller for each block, but larger for the entire image. The value of and the length of the watermark sequence are increased iteratively in each loop cycle until the similarity threshold is reached (SSIM between the watermarked and the original blocks meets the threshold).

4.3. Wavelet Domain Embedding: Ahuja’s Method [13]

For the original algorithm in [13], the watermark casting is performed in the wavelet domain. Authors in [13] utilize the wavelet decomposition property to divide the host image to different frequency resolutions. Similar to the embedding process in the DCT domain, the watermark sequence is adaptively embedded in the middle frequency wavelet coefficients. For the proposed algorithm, casting of the mark is done in each block separately. The embedding process is done iteratively. Insertion of the watermark in each iteration is performed on 2000 additional wavelet coefficients compared to the previous iteration. The embedding process continues until the SSIM threshold is reached.

4.4. Wavelet Domain Embedding: CDMA-Based Method [14]

For the original algorithm, the watermark casting is based on the code division multiple access (CDMA) and multilevel coding [14]. The bits of the watermark are grouped together and for each sequence a different modulation coefficient is used. Different watermark messages are hidden in the same transform coefficients of the cover image using orthogonal or semiorthogonal codes [14]. The proposed algorithm is the same as the original one. However, it is performed for each individual block separately. Size of the mark increases during each iteration until the SSIM threshold is reached.

Figure 2 demonstrates the original and the watermarked images for all four algorithms mentioned above. This figure also shows the effect implied by our method on the images. As observed in Figure 2, the proposed method improves the imperceptibility property of the watermark while the capacity remains constant in both original watermarking method and the proposed approach. Table 1 illustrates the statistical invisibility of the watermark. Similarity in terms of the MSE and the SSIM between the original and the watermarked images is given in Table 1. It is revealed that the similarity and therefore the imperceptibility are maintained more in the proposed algorithm than in the original methods. In some cases, the difference is salient.

Table 1: Watermark imperceptibility and algorithm complexity for the original and proposed methods.
Figure 2: LSB algorithm: original (a) and proposed (b); DCT-based algorithm: original (c) and proposed (d); wavelet-based algorithm: original (e) and proposed (f); CDMA-based algorithm: original (g) and proposed (h).

The complexity of the proposed method highly depends on the complexity of the original method that our approach is modifying. As Table 1 shows, the complexity for the LSB watermarking is highly reduced when it is improved by our method. However, the proposed method increases the complexity for the DCT-based and the wavelet-based watermarking methods. For the CDMA-based scheme, the complexity is not changed. Taking the above considerations into account and the fact that our approach performs the same trend as the original approach, we conclude that the complexity of the proposed method depends on the original watermarking scheme.

Figure 3 demonstrates the response of watermark detectors to attacked watermarked images. After the original image is watermarked by the proposed methods (i.e., modified version of the four algorithms), the following three types of attacks are applied to them: Gaussian noise, low pass filtering (LPF), and JPEG compression. Attacks have the same parameters and conditions for all images. The watermark is considered as a sequence of bits, even for the LSB watermarking. 300 random sequences are generated where three of them are replaced with the extracted sequences from the attacked images. Figure 3 shows the correlations between the true watermark sequence and the above 300 sequences. It is revealed from this figure that the proposed method is robust in almost all attacks. This robustness is followed from the robustness of the original algorithms, in particular for the DCT-based and the wavelet-based algorithms which are robust against attacks.

Figure 3: Watermark detection performance for the proposed method. High bars that stand out in each figure represent Gaussian noise, low pass filtering (LPF), and JPEG compression, from left to right, respectively: (a) LSB watermarking, (b) DCT-based watermarking, (c) wavelet-based watermarking, and (d) CDMA-based watermarking.
4.5. Sensitivity of the Proposed Method to the Block Sizes

It was mentioned in Section 3 that the blocks for watermark embedding are of size. We selected equal to 32 for an efficient trade-off between the performance of the proposed method and computational complexity. In this subsection, we study the effect of the block size on the embedding performance as well as the computational complexity. To this end, the performance and complexity are evaluated at various block sizes. The same parameters as Table 1 are used so that the SSIM values for the original algorithms are 0.72, 0.5, 0.75, and 0.42 for the LSB, DCT-based [12], wavelet-based [13], and CDMA-Wavelet [14] methods, respectively. Figure 4 illustrates the trade-off between the performance, complexity, and the block size. It is observed from Figure 4 that changes in block size result in smooth variations in the watermark imperceptibility and complexity of different algorithms. We chose a block size of 32; however, any other block size can be chosen.

Figure 4: Imperceptibility and complexity for various block sizes: (a) LSB watermarking, (b) DCT-based watermarking, (c) wavelet-based watermarking, and (d) CDMA-based watermarking.
4.6. Sensitivity of the Proposed Method to the Threshold Value

The block embedding threshold value (thr2) specifies the length of the watermark which is embedded in each block. The lower the threshold is, the more number of bits will be embedded in each block and therefore a higher capacity is achieved. However, a lower threshold results in a more perceptible mark in the host image. To find a suitable threshold value, we sweep the threshold value from 0.6 to 0.9 and evaluate the SSIM and MSE values for the marked image compared to the original one. Results are illustrated in Table 2. It is observed from Table 2 that the SSIM and MSE values vary smoothly when the threshold changes. This shows the robustness of the proposed method to the threshold value. We chose a threshold value of 0.8. However, this value can be changed according to the desired amounts of imperceptibility and capacity.

Table 2: Watermark imperceptibility and algorithm complexity for various threshold (thr2) values.
4.7. Validation of the Proposed Method over a Dataset of Images

We validate the performance of the proposed method for a dataset of images to verify the generalization of our approach. Figure 5 shows snapshots of the incorporated image set. Using this set of images and the same threshold parameters used in Section 4, the proposed method resulted in an average of 25%, 44%, 23%, and 53% improvements in visual quality (SSIM) for LSB, DCT-based [12], wavelet-based [13], and CDMA-based [14] watermarking methods, respectively.

Figure 5: Snapshots of the incorporated image dataset.

5. Conclusion

In this paper, we proposed a new method to improve the watermark embedding procedure. We suggested that many embedding algorithms can be performed via each block separately and for all the blocks. This can be performed during an adaptive iterative process. The stop condition for this procedure is a threshold on the structural similarity that is compatible with the human visual system. Numerical results showed that the proposed method can improve the imperceptibility of the watermark for various examined watermark casting algorithms. It was seen that the capacity remains constant and the complexity varies among different marking algorithms. After intentional attacks such as Gaussian noise, low pass filtering, and JPEG compression, the watermark detector showed noticeable correlation between the extracted watermarks and the true watermarks which verifies that the proposed algorithm is robust against these attacks.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  1. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann, Boston, Mass, USA, 2nd edition, 2008.
  2. X. Gong and H.-M. Lu, “Towards fast and robust watermarking scheme for H.264 video,” in Proceedings of the 10th IEEE International Symposium on Multimedia (ISM '08), pp. 649–653, Berkeley, Calif, USA, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. S. S. Bedi and S. Verma, “A design of secure watermarking scheme for images in spatial domain,” in Proceedings of the Annual India Conference (INDICON '06), pp. 1–6, New Delhi, India, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. H. H. Larijani and G. R. Rad, “A new spatial domain algorithm for gray scale images watermarking,” in Proceedings of the International Conference on Computer and Communication Engineering (ICCCE '08), pp. 157–161, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. V. Licks, F. Ourique, R. Jordan, and F. Perez-Gonzalez, “The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking,” in Proceedings of the International Conference on Image Porcessing (ICIP '03), pp. 455–458, September 2003.
  6. M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “Capacity of the watermarking channel: how many bits can be hidden within a digital image,” in Security and Watermarking of Multimedia Contents, vol. 3654 of Procedeeings of SPIE, pp. 437–448, January 1999.
  7. A. Banitalebi, S. Nader-Esfahani, and A. N. Avanaki, “Robust LSB watermarking optimized for local structural similarity,” in Proceedings of the 19th Iranian Conference on Electrical Engineering (ICEE '11), May 2011.
  8. Y. Yusof and O. O. Khalifa, “Imperceptibility and robustness analysis of DWT-based digital image watermarking,” in Proceedings of the International Conference on Computer and Communication Engineering (ICCCE '08), pp. 1325–1330, Kuala Lumpur, Malaysia, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. G. P. Betancourth, A. Haggag, M. Ghoneim, T. Yahagi, and L. Jianming, “Robust watermarking in the DCT domain using dual detection,” in Proceedings of the International Symposium on Industrial Electronics (ISIE '06), pp. 579–584, Montreal, Canada, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Jayalakshmi, S. N. Merchant, and U. B. Desai, “Significant pixel watermarking in contourlet domain,” in Proceedings of the IET International Conference on Visual Information Engineering (VIE '06), pp. 416–421, September 2006.
  11. Z. Wang and A. C. Bovik, “Mean squared error: love it or leave it? A new look at signal fidelity measures,” IEEE Signal Processing Magazine, vol. 26, no. 1, pp. 98–117, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” in Proceedings of the International Conference on Image Processing (ICIP '97), pp. 520–523, October 1997. View at Scopus
  13. R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in Proceedings of the International Conference on Image Processing (ICIP '98), vol. 2, pp. 419–423, Chicago, Ill, USA, October 1998. View at Publisher · View at Google Scholar · View at Scopus
  14. S. P. Maity and M. K. Kundu, “A blind CDMA image watermarking scheme in wavelet domain,” in Proceedings of the International Conference on Image Processing (ICIP '04), pp. 2633–2636, October 2004. View at Publisher · View at Google Scholar · View at Scopus