12/08/2018, 13:27

Do you know zero-watermarking??

Zero-watermarking is a technique for copyright protection. In general, the feature data of the content are encrypted with the copyright data to generate ownership share. The master share is the feature data of the content itself. The master share is registered to certification authority for ...

Zero-watermarking is a technique for copyright protection. In general, the feature data of the content are encrypted with the copyright data to generate ownership share. The master share is the feature data of the content itself. The master share is registered to certification authority for copyright confirmation. When required, the copyright data can be retrieved by decrypting of the master share and the ownership share. Since zero-watermarking does not embed the watermark information into the digital content, the quality of the processed content is not degraded.

We explain the proposal of zero-watermarking using robust VMF (visual map feature). The main idea is to combine the QR decomposition with the 1D-DCT for constructing the robust share files of the zero-watermarking. By using the proposed VMF and PVMF, we easily improve the robustness of zero-watermarking and reduce the computation cost of the proposed methods.

スクリーンショット 2016-05-06 1.24.46.png

Fig 1. Overview of VMF

Generation of VMF

The overview of our proposed VMF method is shown in Fig. 1. Suppose Cmathbf CC is image feature generation function. Four steps that involved in Cmathbf CC to generate the VMF is explained as follows:

  • Convert the RGB image III to YUV color space. Divide Y-component into the non-overlapping blocks Bmathbf BB of size $8 imes 8.Thenumberofnon−overlappingblocksis. The number of non-overlapping blocks is .ThenumberofnonoverlappingblocksisN/8$$
  • Apply QR decomposition on each non-overlapping block Bmathbf BB to obtain R0mathbf R_0R0.
egin{equation}
mathbf B = mathbf Q mathbf R,
end{equation}

where Qmathbf QQ is m×nm imes nm×n matrix and Rmathbf RR is an upper triangular matrix. Let Bmathbf BB and Qmathbf QQ are described as

$mathbf B=[mathbf b_1, mathbf b_2, ..., mathbf b_n]$

and

$mathbf Q=[mathbf q_1, mathbf q_2, ..., mathbf q_n]$

, respectively, where bimathbf b_ibi and qimathbf q_iqi are column vector.

  • Apply 1D-DCT on each R0mathbf R_0R0 to retrieve the DC coefficients F(i),i=0,1,⋯ ,N/8F(i), i=0, 1, cdots, N/8F(i),i=0,1,,N/8.
  • Two consecutive DC coefficients are compared to generate the VMF of the original image. This VMF is used as the master share MMM (Fig 1 (b)) and each point of MMM is generated by comparison of F(i)F(i)F(i) and F(i+1)F(i+1)F(i+1):
M(x,y) = left{ egin{array}{rl}
 1 &mbox{ if $F(i+1) > F(i)$}, 
 0 &mbox{ otherwise},
       end{array} 
ight.

where x,y∈[0,N/8)x,yin [0,N/8)x,y[0,N/8).

Therefore, MMM is generated by M=C(I)M= mathbf C (I)M=C(I). The visibility of MMM can be observed by Fig 1(b). MMM holds the robust edge feature of the original image.

Construction of ownership share

The ownership share OOO (Fig 1(d)) is generated by encryption of the master share MMM with the copyright data WWW (Fig 1(c)). To obtain the ownership share OOO, we apply the XOR operation between MMM and with WWW as follows:

egin{equation}
O=Moplus W, ~O_p=M_poplus W.
end{equation}

Copyright identification

Suppose the property dispute concerning the suspected image I′I'I happens. The CA should judge the rightful owner of the suspected image. The CA asks the owner to provide the secret key and extracts the master share M′M'M of I′I'I by using the same algorithm. That means M′=C(I′)M'= mathbf C (I')M=C(I)

In case of VMF-based method, CA can obtain the watermark W′W'W as follows:

egin{align}
 W'=M'oplus O = mathbf C (I') oplus {mathbf C (I) oplus W} 
onumber  Rightarrow ~W'=W mbox{ if } mathbf C (I')=mathbf C (I).
end{align}

According to W′W'W, CA can judge the rightful owner of the suspected image.

Experimental results

To assess the performance of the proposed algorithm, we conduct ten color images of the well known SIDBA (Standard Image Data-BAse) databasefootnote{http://decsai.ugr.es/cvg/index2.php}. All test images are with size N×N=512×512N imes N = 512 imes512N×N=512×512 pixels. The conducted images are shown in figref{original}. The watermark image is a binary image with size L×L=64×64L imes L = 64 imes 64L×L=64×64 which is shown in Fig 1(c).

スクリーンショット 2016-05-06 1.44.08.png

Fig 2. Original images

In order to evaluate the quality of watermarked images, we employ PSNR (Peak Signal to Noise Ratio) criterion. The PSNR of N×NN imes NN×N pixels image of I(i,j)I(i,j)I(i,j) and I′(i,j)I'(i,j)I(i,j) is calculated as follows:

egin{eqnarray}
    &&hskip-1em PSNR = 20logfrac{255}{MSE}     {
m [dB]},
    &&hskip-1em MSE = sqrt{frac{1}{N	imes N}displaystyle sum^{N-1}_{i=0}sum^{N-1}_{j=0}{I(i,j)-I'(i,j)}^2},
onumber 
    &&hskip-1em (MSE: mbox{Mean Square Error}).
onumber
end{eqnarray}

To judge the robustness, we use the normalized correlation (NC) value between the original watermark WWW and the extracted watermark W′{W'}W. The NC value is calculated as follows:

egin{equation}
   NC = frac{displaystylesum_{i=0}^{L}displaystylesum_{j=0}^{L} [W(i,j)	imes W'(i,j)]}{displaystylesum_{i=0}^{L}displaystylesum_{j=0}^{L}[W(i,j)]^2},
label{eq:ncc}
end{equation}

where L×LL imes LL×L is the size of WWW.

Attacked evaluation

スクリーンショット 2016-05-06 1.47.01.png

Fig 3. Attacked results

The proposed method is robust against almost the attacks in Fig 3 since the average NC values are over 0.8. Therefore, our method can be applied for the copyright protection applications. Ours is more robust against only `rotation and crop', cropping, and tampering attacks as compared to the method of Rani et al.et~al.et al.. The reason is that our VMF can be remained under those attacks whereas the feature of Rani et al.et~al.et al. may be strongly affected.

スクリーンショット 2016-05-06 1.51.07.png

Fig 4. NCs

Some extracted watermarks using the distorted Lena images are shown in Fig 4. The corresponding distorted images are shown in Fig 5. It includes the Photoshop software processing (Pixelize and Puzzle). It is clear that our VMF is more superior than Rani et al.et~al.et al. in some cases.

スクリーンショット 2016-05-06 1.53.03.png

Fig 5. Attacked images

Conclusion

In this work, we have proposed a zero-watermarking method based on the encryption of VMF with the copyright information. In our methods, the original image is not affected by watermark embedding. The watermark size is also not limited. Since our proposed method preserve the feature of entire image, therefore, it especially is robust against strong cropping and tampering attacks. Certainly, it can resist against the common processing and geometric attacks. Moreover, the consuming time of our methods is lower than cite{Rani2}.

0