Digital Watermarking Scheme For Copyright Protction and Tampering Detection
Digital Watermarking Scheme For Copyright Protction and Tampering Detection
1. INTRODUCTION
The development of the Internet has made the transmission of digital images
faster and more convenient. However, some related issues have followed. For
example, a person who is interested may tamper with the image content for deception
purposes. Sometimes the created images may be stolen without the permission of the
author. In view of this, the tamper detection side and copyright protection of digital
images have become important issues. Digital watermarking is a commonly used
method to protect digital images.
Digital watermark refers to a piece of information embedded in a digital image.
A digital watermarking scheme consists of two phases: one is the embedding of the
watermark; the other is the extraction of the watermark [8]. Digital watermarks can
be divided into robust watermarks and fragile watermarks depending on the purpose
of use. Robust watermarking is used to protect the copyright of digital images.
Authors of digital images can choose an image representing a personal logo as a
108 International Journal on Information Technologies & Security, № 1 (vol. 11), 2019
watermark. When the copyright of a digital image is suspected of being violated, the
author can extract the watermark from the image to prove his copyright. The basic
requirement of the robust watermarking scheme is that after the partial image is
edited, the extracted watermark must still have enough recognition to prove the
copyright of the image. Fragile watermarking is used to protect the integrity of digital
images. When digital image content is tampered with, the fragile watermark must be
able to detect the part of the image that has been tampered with. Fragile watermarks
are usually composed of features of the image so that the watermark is sufficiently
sensitive to image tampering.
Generally speaking, when someone directly uses the image without the
authorization of the original author, the person usually makes some modifications to
the image. By doing so, the person hopes to evade the copyright controversy;
furthermore, the person hopes the modification can destroy the robust watermark in
the image. If the watermark is robust enough, the author can extract the robust
watermark to prove the copyright. Let us think about a situation. Supposed that the
person who steals the image is not for copyright infringement, and that his purpose
of modifying the image is not to destroy the robust watermark in the image. but to
intentionally add some fake content to the image and use it to frame the author. This
person may add some fake content to the image to frame the original author. The
author will argue that the content of these frauds is not from himself, but that
someone has maliciously framed him. However, if the original author is asked to
extract the robust watermark, the robust watermark will make the original author
unable to prove his innocence. If the image contains a fragile watermark, the original
author can prove his innocence by fragile watermarking. Because the fragile
watermark can help the original author to point out that these images have been
tampered with, the content of the fake is not the original. Therefore, a scheme with
both robust and fragile watermarking is necessary. However, few studies have
proposed a dual-purpose digital watermarking scheme. The purpose of this paper is
to expand the previously proposed robust watermarking scheme into a dual-purpose
watermarking scheme. The previous proposed watermarking method has a good
robustness against cropping attacks. If we can combine the fragile watermark to the
previous method, we can avoid the situation mentioned above that is maliciously
framed by others.
The following sections are arranged as follows. The second section will discuss
the relevant research. The third section explains in detail the practice of the proposed
scheme. The fourth section is the experimental results and some discussions of this
study. Finally, the fifth section is the conclusion of this study.
International Journal on Information Technologies & Security, № 1 (vol. 11), 2019 109
2. RELATED WORKS
2.1. QR decomposition
Because a digital image can be seen as a matrix, recently, some researchers
employed matrix factorization, such as singular value decomposition (SVD) [1-2, 7]
or QR decomposition [3, 5, 6, 9-11], to design their digital watermarking schemes.
The main idea is to utilize matrix factorization to decompose the image and embed
the watermark into one of the decomposed matrices. Because the computational
complexity of SVD is higher than that of QR decomposition [10], QR decomposition
is a more common method.
The QR decomposition can factor a m n matrix A into a m m orthogonal
matrix Q and a m n upper triangular matrix R, where
A= QR.
If the columns of A have correlation with each other, the absolute values of the
elements of the first row of R are probably greater than those of the other rows. Since
there usually exits correlations between adjacent pixels of an image, QR
decomposition was common in researches related to image processing [3, 8-11].
There are some algorithms for computing the QR decomposition, such as Gram–
Schmidt process, Householder transformations, or Givens rotations.
2.2. QR-based watermarking scheme
In our previous work, the host image is divided into 4 4 blocks, and each block
is decomposed via QR factorization. The robust watermark is embedded in the first
row of R matrix. In the proposed scheme, watermark bit 1 and bit 0 were represented
using f(x) ≥ 0 and f(x) < 0, respectively, and function f is defined as follows:
𝜋
𝑓 (𝑥 ) = 𝑠𝑖𝑛 (𝑥 ∙ 𝐾 ∙ 180), (1)
where K ≥ 0 is a real number. The wavelength of the function f is (360/K), and
thus, parameter K is a wavelength controller. For any element x0 to embed the
watermark bit, if the state of f(x0) is not match the watermark bit, x0 is modified to
x0 such that |f(x0)| = 1 and the difference between x0 and x0 is as small as possible.
The R matrix with the robust watermark is merged with the original Q matrix, and
the digital image is inverted. The main concern of a QR-based digital watermarking
scheme is that the modification to the decomposed matrix may cause the pixel values
out of range. Moreover, the allowable bounds vary from pixels to pixels.
Nevertheless, few of papers gave a discussion about the allowable bounds of the
modification. To cope with this issue, our previous work built several rules to define
the allowable bound before modifying the elements of matrix R. Therefore, the
watermark can be embedded to achieve the possible minimal modification within the
allowable bounds.
110 International Journal on Information Technologies & Security, № 1 (vol. 11), 2019
where
M N
1
MSE
M N i 1 j 1
( pi , j pi, j ) 2 . (3)
The notation M and N in Eq. (3) denote the width and height of an image,
respectively, and pi,j and pi,j denote the pixel of the original and watermarked image,
respectively. Generally, the difference between the watermarked image and the host
image is visually imperceptible if PSNR is greater than 30. The robustness is
evaluated by the indicator NC as follows.
W H
1
NC
W H
(w
i 1 j 1
i, j wi, j ) (4)
The notation W and H in Eq.(4) denote the width and height of the watermark
image, respectively, wi,j and wi,j denote the bit of the original and extracted
watermark, respectively, and ‘’ represents the logical XOR operation. The larger
the NC is, the more robust the extracted watermark is.
Figure 2 is our experimental images. When the watermark bit is embedded in
the R matrix, the K value in the Eq. (1) needs to be determined first. In our scheme,
we set different K values for the four elements of the R matrix. The set of parameter
K in the robust watermarking scheme is (25, 30, 40, 60). The PSNR of the
watermarked image showed that our scheme has good imperceptibility. In this
experiment, we simulated that image was cropped to destroy the embedded
watermark. In order to show the robustness of the proposed scheme, we simulated
different cropping ratios, as shown in figure 3. Figure 4 is the watermark images
corresponding to each of the attacked images in figure 3. Figure 4 shows that even
if the watermarked image is subjected to a cropping ratio of 60%, the NC value is
still as high as 0.8 or more. Therefore, embedding the fragile watermark after hiding
the robust watermark does not impact the effect of copyright verification.
Fig. 4. The NC values of extracted watermarks for cropped images with different cropping
ratio values
Figure 5 is a line graph of the correlation between CR and NC. It can be seen
from this figure that NC did not drop sharply with the increase of CR value, which
means that the method proposed in this study has good robustness.
International Journal on Information Technologies & Security, № 1 (vol. 11), 2019 115
5. CONCLUSIONS
This study proposes a dual function watermarking scheme: one is copyright
verification, and the other is tampering detection. Suppose we need to verify the
copyright, we take the robust watermark representing the author's logo from the
image. In order to avoid the verification of copyright, an attacker may try to destroy
the image to remove the tough watermark. The experimental results of this study
show that even if half of the image is cropped, the extracted tough watermark can
clearly show the author's logo. Assuming we need to verify that the image has been
tampered with, we can take out the fragile watermark. With the fragile watermark,
we can not only know whether the image has been tampered with, but also the part
that has been tampered with. In this research experiment, it can be clearly seen from
the error map that this research method can mark the part that has been tampered
with. In the future research, we will make the fragile watermark not only have the
function of tamper detection, but also serve as the basis for enhancing the strength
of the robust watermark.
REFERENCES
[1] I.A. Ansari, M. Pant, and C.W. Ahn, “SVD based fragile watermarking scheme
for tamper localization and self-recovery,” International Journal of Machine
Learning and Cybernetics, 10.1007/s13042-015-0455-1, October 2015.
[2] S.C. Byun, S.K. Lee, A.H. Tewfik, and B.H. Ahn, “A SVD-Based Fragile
Watermarking Scheme for Image Authentication,” Lecture Notes in Computer
Science, Vol. 2613, pp. 170-178, April 2003.
[3] J. Gao, L. Fan, and L. Xu, “Solving the face recognition problem using QR
factorization,” WSEAS Transl. Mathematics, Vol. 11, Iss. 8, pp. 712-721,
August 2012.
[4] C.S. Hsu, S.F. Tu, “Probability-based Tampering Detection Scheme for Digital
Images,” Opt. Commun., Vol. 283, No. 9, pp. 1737-1743, 2010.
[5] C.S. Hsu and S.F. Tu, “Digital watermarking scheme enhancing the robustness
against cropping attack,” Proceedings of The 6th International Conference on
Frontier Computing (FC2017), pp. 143- 152, Osaka, Japan.
International Journal on Information Technologies & Security, № 1 (vol. 11), 2019 119