Must Read
Must Read
In this chapter, some basic concepts about digital watermarking are described
in as general terms as possible. An introduction is given first. The classification
of watermarking, the functions provided by watermarking, and the benchmarks
and evaluating measurements for watermarking systems are then introduced in
the following sections.
Watermarking is an old technique. It had been used widely in the past. A tra-
ditional and well-known example is the use of invisible ink. People wrote secret
information using invisible ink in order to avoid detection from prying eyes. From
a general point of view, the definition of watermarking may be thought of as a
method to insert or embed extra information into the media, and also to indicate
the method used to obtain the embedded information. The general definitions
of some common terms used in the area of watermarking are listed below.
F.-H. Wang, J.-S. Pan, and L.C. Jain: Innovations in Dig. Watermark. Tech., SCI 232, pp. 11–26.
springerlink.com c Springer-Verlag Berlin Heidelberg 2009
12 Digital Watermarking Techniques
Attack: The artificial processes used for modifying the watermarked data in
order to destroy the watermark contained in the watermarked data.
Attacked Data: The watermarked data which contains natural noise and/or
artificial modification.
In the past decade, owing to the rapid-development of computer technology,
people had shifted their focus from traditional media to digital media. As a
result, watermarking techniques for digital data have been developed and have
become popular.
techniques and invisible techniques. For example, Fig. 2.2(c) shows a picture
which contains a visible logo of University of South Australia (in short, UniSA)
in its top-left corner and Fig. 2.2(d) shows a picture which contains an invisible
watermark.
(a) (b)
(c) (d)
Fig. 2.2. An example of applying the visible watermarking technique and invisible
watermarking technique to a given picture. (a) The original picture. (b) The watermark.
(c) The watermarked picture containing a visible logo in its top-left corner. (d) The
watermarked picture containing an invisible watermark therein.
Fig. 2.3. An example of removing the embedded watermark from the watermarked
picture
From the view point as to what kind of information can be obtained from the
watermarked data, the watermarking techniques can be classified as detectable
techniques and readable techniques. Figure 2.4 illustrates the general distinction
between the two types of techniques.
In the detectable type of techniques, one can only verify if a specified signal
(the watermark) is contained in the cover work. In other words, the detectable
type of systems only gives a binary answer: yes or no. In contrast, the readable
watermarking systems extract and reveal the embedded watermark. As described
in Sect. 2.1, researchers use detection to illustrate the process of obtaining a
binary answer, and extraction to express the process of revealing the hidden
watermark.
For those techniques which belong to the detectable type, the embedded wa-
termark has to be presented during detection. This kind of technique is more
private since it is impossible for an attacker to guess the content of the embedded
watermark, especially if the embedded watermark is encrypted beforehand.
The question of where to hide the signal of the watermark may be divided
into three categories: spatial-domain-based techniques, transform-domain-based
techniques, and quantisation-domain-based techniques.
Generally speaking, the main concept of spatial-domain-based techniques [4]
is to modify the raw data (pixels) of the original host image directly when hid-
ing the watermark bits. The traditional method is to change the Last Significant
Bits (LSB) of certain pixels of the host image according to the watermark bits
(Sect. 4.2.1). For transform-domain-based techniques, the raw data of the host
image are first transformed into frequencies using the discrete cosine transform
(DCT) [2], the discrete wavelet transform (DWT) [87], or other types of trans-
forms. These frequencies are then modified according to the watermark bits so
that the goal of data hiding can be achieved. Then, the inverse transform is
Types of Digital Watermarking Techniques 15
(a)
(b)
A watermark is named private if only the authorized users can recover it. In
other words, it is impossible for unauthorized people to extract the information
hidden within the host data. By contrast, a watermarking technique that allows
anyone to read the embedded watermark is referred as a public watermarking
technique.
From the view point of information theory, security cannot be based on algo-
rithms but rather on the choice of the user key. Therefore, researchers believe
that private watermarking techniques have superior robustness when compared
to public watermarking techniques.
be used to define the embedding position and the embedding process. In con-
trast, a watermarking algorithm is said asymmetric if it uses different keys and
parameters for the embedding and the detection/extraction operations.
Researchers believe, for symmetric watermarking techniques a knowledge of
these parameters is likely to give pirates enough information to remove the wa-
termark from the watermarked data. Therefore, increasing attention has been
given to asymmetric watermarking schemes. Generally speaking, asymmetric
watermarking algorithms use a private key for watermark embedding and use a
public key for watermark detection/extraction.
Fig. 2.5. An example of using digital watermarking for data hiding. The secret message
“Meet at 13:30, old place” is embedded in the cover image.
18 Digital Watermarking Techniques
(a)
(b)
Fig. 2.6. Methods used for commenting a digital photo: (a) Saving the information as
a separate text file, and (b) adding the information directly to the photo, where the
pixels under the text are then obscured.
What Can Digital Watermarking Do? 19
Fig. 2.7. The example of information integration using the invisible and readable
watermarking technique. The information for the photo is embedded within the photo.
(a) (b)
(c)
Fig. 2.8. An example of ownership demonstration using digital watermarking. (a) The
original image. (b) The watermark which indicates the author or owner. (c) The wa-
termark extracted from the watermarked image.
For example if say Bob wants to send a digital file to Alice. He embeds a fragile
watermark in the file and delivers it to Alice by a channel which could be the
Internet. Before Alice receives the file, John happens to obtain the watermarked
file. He modifies the content of the file and sends it to Alice afterwards. When
Alice receives the corrupted file she has no idea as to whether the content is
dependable. She therefore verifies if the received file contains the watermark. Due
to the fragile nature of the watermark, it has weak resistance against tampering,
Alice is unable to find any watermark. She knows immediately that the file she
has received had been tampered with.
2.4.1 Benchmarks
To evaluate whether a watermarking algorithm has good performance or not,
the points outlined in the following sections are usually considered.
Benchmarks and Evaluating Functions 21
A. Imperceptibility
M
N
ED(X, X ) = (X(i, j) − X (i, j))2 . (2.1)
i j
ED(X, X )
MSE(X, X ) = . (2.2)
M ×N
M N
i j (X(i, j) × X (i, j))
NC(X, X ) = M N 2
. (2.3)
i j (X(i, j)
2552
PSNR(X, X ) = 10 × log10 . (2.4)
MSE(X, X )
Here X and X denote the original image and the processed image, M and N
denote the width and height of the images, and X(i, j) and X (i, j) denote the
pixel at position (i, j) of X and X respectively.
In addition, for those digital images in binary format, the Hamming distance
(HD), the bit error rate (BER), and the bit correct rate (BCR) can be used:
M
N
HD(Y, Y ) = |Y (i, j) − Y (i, j)|. (2.5)
i j
HD(Y, Y )
BER(Y, Y ) = × 100%. (2.6)
M ×N
HD(Y, Y )
BCR(Y, Y ) = (1 − ) × 100%. (2.7)
M ×N
In these equations, Y and Y denote the original image and the processed image,
M and N denote the width and height of the images, and Y (i, j) and Y (i, j)
denote the pixel at position (i, j) of Y and Y respectively.
22 Digital Watermarking Techniques
B. Robustness
C. Capacity
Capacity denotes the number of bits the watermarking algorithm can embed
within the host data. Obviously, the more bits embedded, the better capacity
the watermarking algorithm has. However, it is believed that embedding more
bits results in poorer visual quality of watermarked images.
D. Security
Security is used for expressing how well the hidden watermark can be protected.
Usually, researchers evaluate the security of a watermarking algorithm by cal-
culating using how many CPU cycles or how long it takes to break the water-
marking algorithm or to reveal the hidden watermark.
E. Coding Time
Coding time denotes the time consumed by the embedding procedure and the
detection/extraction procedure. In some cases, people are more concerned over
the detection/extraction time than the embedding time, since the embedding
procedure may only be performed once.
F. Summary
There are other points which can be used for evaluating the performance of a
watermarking algorithm. These include the material such as that contained in
References [3] and [62]. Generally, researchers will not determine a watermark-
ing algorithm to be good or bad only from a consideration of the points listed
above. Instead, they prefer to consider other factor such as what application the
watermarking algorithm is served. For example, for the purpose of tampering ver-
ification (Sect. 2.3.5) using digital watermarking, a robust watermarking scheme
becomes useless since tampering verification requires the feature of fragile.
A. Compression
B. Spatial Filtering
Using spatial masks for image processing is usually called spatial filtering. The
masks themselves are called spatial filters [27]. The basic approach when us-
ing spatial filtering is to sum products between the mask coefficients and the
luminance of the pixels under the mask at a specific location in the image.
The most common filters are low-pass filtering, high-pass filtering, and median
filtering. The masks of window size = 3 for low-pass filtering and high-pass
filtering are expressed by Eqs. (2.8) and (2.9) respectively.
⎡ ⎤
1 1 1
⎢ ⎥
1 ⎢ ⎥
⎢
9 ⎣ 1 1 1 ⎥. (2.8)
⎦
1 1 1
⎡ ⎤
−1 −1 −1
⎢ ⎥
⎢ ⎥
1
⎢ −1 8 −1 ⎥ . (2.9)
9 ⎣ ⎦
−1 −1 −1
For median filtering, the luminance of each pixel is replaced by the median of
the gray levels in the range of the (n × n) spatial mask centering around that
pixel.
C. Cropping
D. Shifting
The attackers may move the watermarked image horizontally and vertically to
destroy the watermark information conveyed. If the attacker shifts the water-
marked image h pixels to the right and v pixels downwards, the shifted image
may be represented by:
E. Rotation
M−1 −1
X = {X (i, j)}
i=0 j=0
M−1 −1
= {X (i cos θ, j sin θ)} , (2.11)
i=0 j=0
F. Summary
A. Stirmark
The most well-known tool used for attacking watermarked images is Stirmark [63].
It offers many attack schemes including those mentioned in Sect. 2.4.2 and others
such as image resizing, luminance scaling, shearing, line deletion for example.
B. Optimark
C. Checkmark
D. Certimark
Certimark [64] is popular owing to its open architecture. It allows new func-
tionalities to be integrated easily and provides flexible interface to be plugged-in
watermarking software.
2.5 Summary