Table of Contents
Journal of Computational Engineering
Volume 2015, Article ID 964385, 10 pages
http://dx.doi.org/10.1155/2015/964385
Research Article

A Robust Time Efficient Watermarking Technique for Stereo Images

1Informatics Research Institute, City for Scientific Research and Technology Applications, P.O. Box 21934, New Borg-El-Arab City, Egypt
2Pharos University in Alexandria, P.O. Box 21311, Alexandria, Egypt
3Department of Math and Computer Science, Alexandria University, Alexandria, Egypt

Received 13 May 2015; Accepted 16 June 2015

Academic Editor: Yaohua Deng

Copyright © 2015 M. A. Abdou and A. A. Saleh. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Stereoscopic and multiview imaging techniques are used for reproducing a natural or real world scene. However, the fact that more information is displayed requires supporting technologies to ensure the storage and transmission of the sequences. Beyond these supports comes watermarking as a desirable alternative solution for copyright protection of stereo images and videos. This paper introduces a watermarking method applied to stereo images in wavelet domain. This method uses a particle swarm optimization (PSO) evolutionary computation method. The aim is to solve computational complexity problems as well as satisfy an execution time that complies with normal PCs or smart phones processors. Robustness against image attacks is tested, and results are shown.

1. Introduction

The fast development of communication technology and the exponential increase of Internet users have made the protection of intellectual property rights and the prevention of reproducing original contents a very challenging issue. Image detected by two-dimensional camera contains no depth information. However, in many systems we need depth information, for example, in automated map making, or in robotic vision and target tracking [1]. The stereo imaging system uses two or more spatially separated cameras, as shown in Figure 1. The depth information could be extracted from the differences. Stereo imaging system uses conventional lenses and digital cameras; thus acquired images could be processed in a similar way to digital images.

Figure 1: Stereo imaging camera layout.

Stereo Image Geometry. Stereo image geometry [2] is shown in Figure 2. Assume the optical axis of the two cameras is parallel and separated by a distance . If an object is to be captured, consider located at distance from the axis of one camera and at distance from the optical axis of the other. The images of are located at distances and from the lens axes of both cameras. Image geometry could be summarized as follows [3]:where is the distance from the lens to the detector plane, assumed to be the same with both cameras. The locations of the two images of are given:Assume that optical axis of the two cameras is separated by :ThusSolving for ,Assume that the lens focal length is ; the position of the object and image planes is given by the Gaussian lens formula:However, in most practical systems , the approximation that can also be considered: .

Figure 2: Stereo image geometry.

Considering the distance from the image plane to object plane, that is, , then a final expression for the distance from the image plane to the point is given asIn stereo imaging, accuracy is also an important issue. If an error of in and error in the depth measure of occurred,The ideal distance from the object point to the lens is given by could be expanded in terms of using Taylor expansionSubstituting for , we get thatwhich shows that for a fixed and then the error in the depth measurement rises as the square of distance from the camera. So to get good depth resolution you need a large and so large camera separation, but also for distant object we expect a poor depth resolution.

2D Images Watermarking. 2D digital image watermarking is usually based on a pattern of bits inserted within the image or video signal that helps to pursue the file’s copyright information [4, 5]. Two important criteria are to be maintained: the embedded watermark should not affect the image quality (i.e., watermark should be totally invisible) and the watermark should be robust to common image attacks (i.e., lossy compression, linear or nonlinear filtering, cropping, noise, etc.) [6, 7]. Watermarking techniques are classified into two classes according to the need of the presence of the original image or not. Furthermore, most common watermarking methods use an additive watermark; that is, the watermark is added either to the image pixels in the spatial domain or to the coefficient in the transform domain. Watermarking in the transform domain gained a great importance in the previous years due to problems of dealing with raw signals. One of the remarkable transforms in the area of image processing and computer vision is the discrete wavelet transform (DWT). The DWT can be implemented using wavelet filters and downsamplers to reach four quadrants: approximation subband (LL), horizontal detail subband (LH), vertical detail subband (HL), and a diagonal detail subband (HH). This process can be repeated to the approximation subband to generate the level 2 wavelet coefficients. The process continues according to the required application [8].

Aslantas et al. [9] introduced a technique that uses a fragile watermarking method based on the discrete cosine transform (DCT) and Genetic Algorithm (GA). The DCT has a slightly high degree of complexity in the calculations and the GA process needs long time to converge. Moreover, the watermarked images did not resist certain attacks like cropping and noise attack. In [4] a robust watermarking method was presented. The algorithm used the DWT environment to embed the watermark and the particle swarm optimization (PSO)—applied to raw (special domain) data—to reach invisible watermark effects. This method tried to overcome problems that emerged in [9]; and the authors assumed that using DWT and PSO instead of DCT and GA leads to better translation map, that is, matrix where the watermark bits were embedded. The PSO algorithm is summarized in Figure 3 [10].

Figure 3: PSO algorithm.

In [11] Hwang et al. introduced a stereo watermarking scheme based on DWT where the watermark is embedded in one of the two images (right) and extracted from the same image. The paper focused on a comparison between DCT and DWT transform performance to ensure the improvement when using the DWT. Another important method presented a new watermarking scheme designed to reach the trade-off between transparency and robustness [12]. This method was evaluated on two stereoscopic image corpora: natural image and medical data. However, the authors did not consider attacks within the stereo images.

In a previous work [13], we developed a technique based on Hwei-Jen Lin’s method for 2D images. The algorithm was tested and results showed good achievement of execution time while obtaining acceptable PSNRs. This paper extends the 2D algorithm presented in [13] to a modified algorithm suitable for stereo images. Moreover, different measures are used to prove the robustness of this modified algorithm to image attacks. Our goal is to achieve high image quality, better execution time, and more robustness against attacks without increasing complexity.

The paper is organized as follows: Section 1 gives an introduction, Section 2 describes the proposed stereo images watermark algorithm, Section 3 gives image results and moves to image attacks and robustness of the proposed work, and finally Section 4 gives the conclusion.

2. Stereo Images Watermarking Algorithm

Stereo photo maker is a free stereo image editor/viewer used with all operating systems. The algorithm is executed on a PC with the following specifications: operating system: Windows 8 Pro 64-bit; processor: Intel (R) Core (TM) i7-3632QM CPU @ 2.20 GHz (8 CPUs); memory: 6144 MB RAM. Figure 4 shows stereo image maker software.

Figure 4: Stereo image maker.

The watermarking technique could be summarized in the following steps:(a)Decompose the stereo image into its left and right images (each of size ).(b)Apply one-level DWT decomposition to the left and right input images.(c)Divide the binary watermark image (of size ) into separated squared blocks ().(d)Extract the HL subband of each image, and divide it into separated squared blocks of size .(e)Embed the four watermark bits into the LSBs of the four diagonal HL coefficients, as shown in Figure 5.(f)The PSO is used to train and search the optimal translation map for every squared block:(g)Apply Inverse DWT to the embedded image.(h)Calculate the round map (RM) from the following: (i)Then the watermarked image is calculated using the round map from the following rules:(j)Finally, the stereo image is formed from both left and right watermarked images.The PSO [14], as the decision support algorithm, starts by creating the random swarms of particles. Every particle is represented as a string, , , where is the swarm size (number of particles). The particle size is the same as that of the translation map (64). The population size is “” set to 80, and the maximum number of iterations is taken equal to 10. The position and velocity of each particle are updated till all the 256 squared blocks of IDWT have reached their best translation map. In our previous work [13], PSO was used to find the best DWT coefficients in HL subband for embedding the watermark sequence. An optimal translation map was reached using PSO in extremely efficient execution time. The proposed WT domain watermarking technique [13] reduced time in watermark embedding and extraction by 140% and increased PSNR by 10% when compared with [4].

Figure 5: Watermarking algorithm flow graph.

To extract the embedded watermark, the stereo watermarked image is decomposed into its two left and right images. The DWT is applied; HL subband coefficients are where the watermark is embedded.

3. Results

Ten stereo images case studies (each decomposed into left and right images) are entered to the proposed system. For each stereo image three different watermarks are applied, resulting in a total of 30-image framework. Statistical measurements, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), and Normalized Correlation (NC), are used to validate the system’s performance. Tables 1 and 2 demonstrate two of the tested cases. From Table 1, it is important to verify that the PSNR has reached 56.6 db for the stereo image, while the MSE is about 0.1 and the normalized correlation is found to be 0.3. Embedding and extraction time has reached 0.8 seconds on the normal PC which is acceptable. In Table 2, the same results are obtained except that the PSNR has dropped slightly to 56.4 db.

Table 1: Stereo image watermarking measures, Case  1 with watermark 1.
Table 2: Stereo image watermarking measures, Case 2 with watermark 2.
3.1. Noise Attack

Noise affects images for many reasons. During generation, transmission, or processing images could undergo severe attacks. Watermarks are also affected by noise and sometimes it is a challenge to ensure extraction of the correct watermark without being misjudged due to noise. Stereo images contaminated with noise are to be studied using our proposed algorithm and with that presented in [8]. Noise densities ranging from 0.01 to 0.1 are studied and results are registered. The proposed technique shows remarkable withstanding to noise especially for noise densities less than 0.05.

3.2. Cropping Attack

Cropping may be the cause of different image processing instrumentation errors. Horizontal and/or vertical cropping are tested. Results are shown in Table 4.

3.3. Compression Effect

It is evident that images or videos could not be saved or transmitted in a raw form. Compression comes as an essential way to deal with images. Table 5 shows the effect of JPEG compression on images and watermarks using the proposed technique.

From the obtained results, it could be concluded that the proposed WT-PSO with translation map method has given high PSNR, minimum time, and acceptable watermarking extraction compared to time domain technique. Furthermore, the proposed algorithm withstands image attacks in stereo images. Tables 1 and 2 show that the PSNR has a slight difference between both techniques; however, execution time has a great impact difference. Tables 3 and 4 prove that both techniques succeeded watermark extraction, when exposed to noise and cropping attacks. Table 5 gives a remarkable improvement: the proposed method watermark extraction while JPEG compression is successful, while the method proposed in [8] failed during extraction in stereo images.

Table 3: Noise attack effect on stereo images using two different techniques at two noise densities.
Table 4: Vertical and horizontal cropping attacks.
Table 5: JPEG compression attacks.

When talking about algorithm complexity, the order of complexity does not change since using PSO in spatial domain or in frequency domain does not affect the order of complexity . MATLAB cyclomatic complexity has been calculated based on image sizes and iterations used to execute the whole code. Studies show a correlation between a code cyclomatic complexity and its testability. This means that in codes with higher complexity there exists a high probability of error when fixing, enhancing, or refactoring the code. Results show that MATLAB complexity is approximately the same in both the proposed and the compared algorithms.

4. Conclusion and Future Work

An algorithm for stereo image watermarking has been developed. The algorithm applies PSO in wavelet domain based on translation map to better embed the watermark in both left and right images. Obtained results were compared with Hwei-Jen Lin’s method. Remarkable improvement in execution time has been obtained; that is, the proposed WT domain watermarking method has reduced timein watermark embedding and extraction by approximately 150%. Furthermore, more robustness, especially in compression attack, has been shown. Finally, the proposed algorithm has not increased either the order of complexity or the code cyclomatic complexity.

In our future work, comparison with other efficient methods known in the literature will be performed and other types of attacks should be considered.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  1. R. J. Schalkoff, Digital Image Processing and Computer Vision, John Wiley & Son, 1989.
  2. R. Szeliski, Computer Vision: Algorithm and Applications, Springer, 2010.
  3. S. Kobayashi, F. Sakaue, and J. Sato, “Multiple view geometry of projector camera systems from virtual mutual projection,” Progress in Informatics, vol. 7, pp. 3–10, 2010. View at Google Scholar
  4. H.-J. Lin, C.-W. Lu, and J.-P. Yeh, “DWT-based watermarking technique associated with translation maps,” in Proceedings of the International Conference on Business and Information (BAI '10), 2010.
  5. X.-G. Xia, C. G. Boncelet, and G. R. Arce, “Wavelet transform based watermark for digital images,” Optics Express, vol. 3, no. 12, pp. 497–511, 1998. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Inoue, A. Miyazaki, and T. Katsura, “An image watermarking method based on the wavelet transform,” in Proceedings of the International Conference on Image Processing (ICIP '99), pp. 296–300, Kobe, Japan, October 1999. View at Scopus
  7. R. Dugad, K. Ratakonda, and N. Ahuja, “New wavelet-based scheme for watermarking images,” in Proceedings of the International Conference on Image Processing (ICIP '98), pp. 419–421, Chicago, Ill, USA, October 1998. View at Scopus
  8. K. Mahmoud, S. Datta, and J. Flint, “Frequency domain watermarking: an overview,” The International Arab Journal of Information Technology, vol. 2, no. 1, pp. 33–47, 2005. View at Google Scholar
  9. V. Aslantas, S. Ozer, and S. Ozturk, “Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms,” Optics Communications, vol. 282, no. 14, pp. 2806–2817, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. V. Selvi and D. Umarani, “Comparative analysis of ant Colony and particle swarm optimization techniques,” International Journal of Computer Applications, vol. 5, no. 4, pp. 1–6, 2010. View at Publisher · View at Google Scholar
  11. D.-C. Hwang, J.-H. Ko, J.-S. Park, and E.-S. Kim, “Stereo watermarking scheme based on discrete wavelet transform and feature-based window matching algorithm,” in Multimedia Systems and Applications VII, vol. 5600 of Proceedings of SPIE, p. 182, October 2004. View at Publisher · View at Google Scholar
  12. A. Chammem, M. Mitrea, and F. Prêteux, “DWT-based stereoscopic image watermarking,” in Stereoscopic Displays and Applications XXII, Proceedings of SPIE, San Francisco, Calif, USA, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. A. A. Saleh and M. A. Abdou, “Evolutionary computation methods in image watermarking,” International Journal of Computer Applications, vol. 63, no. 10, 2013. View at Publisher · View at Google Scholar
  14. E. Vahedi, C. Lucas, R. Zoroofi, and M. Shiva, “A new approach for image watermarking by using particle swarm optimization,” in Proceedings of the IEEE International Conference on Signal Processing and Communications, pp. 1383–1386, 2007.