Robust Invisible Watermarking of Volume Data Using The 3D DCT
Robust Invisible Watermarking of Volume Data Using The 3D DCT
359
0-7695-1007-8/01 $10.000 2001 IEEE
1. A 4 x 4 x 4 block-based 3D discrete cosine transform 5. The 3D inverse DCT is performed on VACTto obtain
(DCT) transform [ 111 is applied to the volume V. The a n, x ny x nz size volume V'. The inverse 3D DCT
4 x 4 x 4 3D DCT is computed using: is done using:
f(2,Y, 2) =
F ( u ,21, w) =
~ 3 3 3
3 3 3
+ +
(22 1)un (2y 1)vncos (22 -t 1)wn cos
+ cos
+
(22 1)ux (2y 1)vncos (22 1)wn +
cos
8
cos
8 8
8 8 8 I*
This new volume V' is the watermarked volume data
where corresponding to the original volume data V.
For any given set of volume rendering parameters, the 2D
image produced by volume rendering on V' will be percep-
tually indistinguishable from the 2D image produced using
V. Since a pseudo-noise sequence is used for modulation,
[ 1, otherwise. the watermark sequence is also noise-like which ensures
that the watermark is difficult to detect, locate and manipu-
Note that in our case f(z,y,z)corresponds to the late without compromising on the quality of the correspond-
voxel values and F ( U , V , W )corresponds to the 3D ing volume-rendered images.
DCT coefficients. The 4 x 4 x 4 block-size has been
chosen as a trade-off between the computational com-
plexity of the transformation and the availability of 3. Watermark Detection
sufficient frequencies to hide the watermark.
For detecting the existence of the watermark, the DCT-
2. To embed the watermark information bits aj E transformed original volume data V is subtracted from the
(1, -1) the bits are first spread by a large spread factor DCT-transformed watermarked volume data V' (we use 3'
cr ,called the chiprate [3]. For spreading the informa- instead of V' because it may have been subjected to at-
tion, the bit pattern is repeated in a raster-scan order tacks') to obtain the residual volume data DCT coefficients,
to tile the entire volume of size n, x ny x nz. This i.e. V T = e' - V. The 3D inverse DCT is performed
improves its robustness to geometrical attacks such as on this residual data V T to obtain the residual watermark
cropping. The spreading provides spatial redundancy sequence tii. This tii is then analyzed by correlating it
by embedding the information bits into CT number of with the same pseudo-noise sequence that was used in the
voxels: embedding phase where correlation can be understood as
demodulation followed by summation over the correlation
bi = a j V i = j x K (1)
window. The correlation window for each bit is the chiprate.
and K varies from 1 to cr. The spread bits bi are If the peak of correlation is positive, the corresponding wa-
then modulated with a pseudo-random-noise (PN) se- termark bit is +1 else it is -1. Considering one subset of
quence. the watennark values zi3i over the correlation window where
pi where p i E {-1,1}. (2) iE l...CT
CT CT
are added to form a watermarked block by' = b y +by The required information bit Lj (i.e. the detected watermark
which constitute the watermarked volume VACTin the bit) is
frequency domain. a, = sign&). (5)
360
Thus, to retrieve the watermark, the original volume data
and the same unshifted pseudo-noise sequence that was
used at the embedder are required.
4. Test Results
5. Conclusion
361
Remaining SNR PSNR Emr
(a) The original logo
size (%) (dB) (dB) rate (%)
100.00 3 1.888 49.462 0.00
60 x 60 x 60 82.40 7.763 25.337 0.00
56 x 56 x 56 66.99 3.977 21.551 0.00
52 x 52 x 52 52.64 2.351 19.925 0.05
44 x 44 x 44 32.50 1.099 18.672 6.58
17.80 0.161 17.735 33.7
Gaussian SNR PSNR Error I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure
noise SNR (dB) rate (%) Spread-Spectrum Watermarking for Multimedia. IEEE Trans-
(dB) (db)
actions on Image Processing. Vol. 6, No. 12, 1673-1687, De-
35.0 30.1 47.9 0.00
cember 1997.
30.0 28.4 46.2 0.00
25.0 25.7 43.5 0.1 1 J. Dittman, M. Stabenan, R. Steinmetz. Robust MPEG Video
20.0 21.7 39.5 4.10 Watermarking Technologies. Proceedings of ACM MM '98.
15.0 17.2 35.0 16.0 Bristol, U.K., 71-80, September 1998.
10.0 12.4 30.2 30.0
X. Guan, Y. Wu, M. S. Kankanhalli, Z . Huang. Invisible Wa-
termarking of Volume Data Using Wavelet Transform. Pro-
ceedings of MMM '2000. Nagano, Japan, 152 - 166, Nov
Table 2. The skull dataset: experiment results
7000.
of robustness on adding Gaussian noise.
E Hartung, M. Kutter. Multimedia Watermarking Techniques.
Proceedings of the IEEE. Vol. 87, No. 7, 1079-1 107, July
1999.
362