Visual Cryptography 1
Visual Cryptography 1
Pixels of FHL and SH2 only take two values 1 and -1, The detection algorithm discussed above is a blind
representing white and black pixels respectively. As a detection scheme. Substituting the high-pass filter in
result, only the two values 1 and -1 are allocated to fig.4 by an image subtractor and using the host image,
the pixels’ values of the gained image FST. If a black IM, transforms the detection scheme to informed
pixel is stacked to another pixel, a black pixel is structure. This leads better robustness to various
obtained, whereas a white pixel is gained only if two watermarking attacks, however the original
white pixels are stacked. unwatermarked image is needed at the detector.
The last block before evaluating the correlation is the
reduction function, which returns an M*N-pixels
image whose (i,j)-th pixel is given as: 4. Experimental Results
⎧1 if L(i, j ) > 0 We simulated the proposed watermark insertion and
U (i, j ) = ⎨ (4) detection schemes and investigated the effect of
⎩− 1 otherwise
various attacks on the watermarking system. We
where: examined different high pass filters of order 21 to find
the optimum filter that is to maximize the ratio of
correct detection (correlation coefficient ρ, in case of the watermarked image, which more correspond to the
genuine watermark logo) to false detection high-frequency inserted watermark.
(correlation coefficient ρ for an irrelevant watermark
Cropping can be taken as the dual of the JPEG
logo). The maximum ratio was about 8.3 for different
compression, which zeros out spatial components of
watermark logos, which gained by using the HPF
the image. Because of its structure, the proposed
whose frequency response is shown in fig. 6.
scheme is quite robust to the cropping attack, if spatial
synchronization is made. Table 3 shows decrement of
the correlation coefficient of the cropped watermarked
image to the typical watermarked correlation
coefficient, for both cases with and without
performing synchronization.
Cropping
10 20 30 40 50
Percentage
Figure 6 Frequency response of the HPF used in the detection Decrement
scheme.
of ρ (%) 6 13 8 11 13
Synch.
The threshold THR in the detection scheme should be Detection
Y Y Y Y Y
properly selected to minimize the false alarm ratio Status
(detecting a watermark in an unwatermarked image or Decrement
denying the watermark in a watermarked image). We No 36 43 57 55 75
of ρ (%)
set THR equal to 0.12 based on certain experiments. Synch.
We also surveyed the effect of different attacks on the Detection
watermark detection. Y Y Y Y N
Status
JPEG Compression acts as a low-pass filtering, which The effect of Image Rotating on the proposed
zeros out frequency components. We marked different watermarked image is also taken as a watermarking
images using the proposed scheme, and then attack. By performing spatial synchronization
performed JPEG compression with various quality (rotating the detection key by a value equal to what is
factors, Q, on the marked images. Subsequently, we applied to the marked image), the correlation value
verified the existence of the watermark in the shows up to 4% decrement for various rotation angels.
compressed images by evaluating the correlation However, the scheme is fragile to rotation if no
coefficient as in (6). Table 2 depicts decrement of the synchronization is made.
correlation coefficient of the JPEG compressed
watermarked image over the typical uncompressed Changing the aspect ratio (AR) of the watermarked
correlation coefficient. A “Y” in the last row of the image, which is the image’s height to width ratio, has
table indicates that the watermark’s existence is a little impact on the correlation coefficient. Table 4
successfully detected, whereas an “N” shows that illustrates the effect of changing the aspect ratio of a
watermark is not detected due to the performed 256*256 pixels watermarked image on the detection
watermarking attack. process.
Table 2 Decrement of the correlation coefficient and the detection Table 4 Decrement of the correlation coefficient and the detection
status after JPEG compression with various quality factors (Q). status after changing the AR of a 256*256 pixels watermarked
image.
Quality
90 80 70 60 New Size
factor 256*128 256*64 512*256
(pixels)
Decrement
29 61 71 75
of ρ (%) Decrement
14 6 26
of ρ (%)
Detection
Y Y Y N
Status Detection
Y Y Y
Status
The high impact of the JPEG compression on the
watermark detection is due to the fact that JPEG The high robustness of the proposed scheme to
compressor eliminates high frequency components of geometrical attacks, in the presence of
synchronization, is due the VSS scheme’s robustness
to this kind of distortions. Fig. 7 illustrates the schemes are fast and do not need a high amount of
reconstructed secret image by the VSS scheme, if the computational capabilities.
shares are geometrically distorted.
It must be again mentioned that selection of the
parameter µ in (1) makes a tradeoff between
imperceptibility and robustness of the watermarking
system to different attacks. We chose µ equal to 2 in
the simulations, where a higher value for µ (up to 5)
could result in a higher robustness to the surveyed
attacks, especially the JPEG compression process.
Also, if the host image is present at the detector, an
informed watermark detection scheme leads higher
robustness to different watermarking attacks.
Conclusions
In this paper, we have proposed a new watermarking
algorithm for digital images. The proposed scheme is
simple and is based on the concept of visual
cryptography, which is performed in the spatial
domain of the host image. Digital mark to be
embedded in the host image is one of the shares of the
Figure 7 Retrieving the secret image (watermark) from its
owner’s mark (that can be a visible logo), whereas the
geometrical distorted shares. (Top) image rotating, (bottom-left): other share is utilized as a detection key in the
image cropping and (bottom-right): changing the aspect ratio. detection process. Watermark detection can be
performed in both informed and blind structures,
We also investigated the robustness of the scheme to depending on the host image’s presence at the
image scaling. We low-pass filtered the watermarked detector. The detection algorithm relies on the fact
image using a four-tap filter, prior to downsampling that stacking images, containing corresponding shares
by R, in each direction. The resulting image is of the logo, make a high correlation to the logo that is
upsampled before calculation of the correlation also detectable by the human eyes.
coefficient. Table 5 shows the decrement of the
correlation coefficient of scaled image compared to Acknowledgment
that of the original watermarked image. In case no This project is partly supported by the Iran
filtering is performed, prior to downsampling, the Telecommunication Research Center (ITRC).
scheme shows a higher degree of robustness.
References
Table 5 Decrement of the correlation coefficient and the detection
status after image scaling, with and without filtering prior to [1] J. S. Pan, H. C. Huang and L. C. Jain, Intelligent
downsampling. Watermarking Techniques, World Scientific
Publishing Co. Pte. Ltd., Singapore, 2004.
Scaling Ratio (R) 2 4 8 16
[2] M. Naor, and A. Shamir, “Visual Cryptography”,
Decrement Advances in Cryptology – Eurocrypt’94
of ρ (%) 39 37 20 43 Proceeding, LNCS Vol. 950, Springer-Verlag,
No
1995, pp. 1-12.
Filtering Detection [3] M. Naor and A. Shamir, “Visual Cryptography II:
Y Y Y Y
Status Improving the Contrast Via the Cover Base”,
Decrement Cambridge Workshop on Protocols, 1996.
of ρ (%) 65 64 65 77 [4] A. Shamir, “How to Share a secret”,
With
Communications of the ACM, vol. 22, 1996,
Filtering Detection pp.612-613.
Y Y Y N
Status [5] G. Blakley, “Safeguarding cryptographic keys”,
in: Proceedings of National Computer
The utilized VSS scheme is simple, if the
Conference, 48, AFIPS Press, New York, 1979
computational complexity is considered. As a result,
the proposed watermark insertion and detection