Munoz Ramirez2015
Munoz Ramirez2015
Mexico
Abstract- In recent years, 3D technology has grown image is revealed. The visual cortex of the brain fuses the images
significantly and over the time has become more accessible to a received from each eye and forms a 3D image.
wider group of people, however, there is so few research that seeks
to protect the intellectual property of 3D content, in specific There are schemes for 3D models [4,5],meshes [6,7],DIBR
anaglyph images, which are easier and cheaper to generate. This [S] and pair stereo images [9,10],but,there are only few articles
paper presents a method to embed a color image as an invisible about 3D anaglyph image watermarking. Bhatnagar, Wu and
watermark into a 3D anaglyph image, for the protection of Ranman, proposed a robust security framework [11]. In this
intellectual property of this type of digital material; the insertion paper, the 3D anaglyph images are transformed into RGB space
algorithm is performed in the DCT domain using the QIM-DM color and each channel is processed separately. The watermark
method in order to achieve the maximum imperceptibility of the embedding performs the Fractional Fourier Transform [12] and
watermark. Results demonstrate highest robustness of the Reversible Integer Transform with Singular Value
algorithm to JPEG compression, impulsive noise, Gaussian noise, Decomposition [13].
as well as high imperceptibility of the watermark obtaining
average values of about 40dB in the PSNR between the original Prathap and Anitha proposed in [14] a simple scheme for 3D
and marked anaglyph images. anaglyph image protection, based on 3D DWT and Jacket
Matrix. This scheme decomposes the host 3D anaglyph image
Keywords-3D image, Anaglyph, Invisible, Digital Color by performing 3D DWT. Next, the middle level sub bands are
Watermarking, copyright protection. divided into blocks and each block is masked using Jacket
matrix [15,16]. Jacket matrix is a special class with their inverse
I. INTRODUCTION being determined element-wise. The watermark is embedded by
Nowadays, 3D technology has become more accessible to a changing the diagonal elements of the masked blocks.
wider group of people, this technology can not only be
This article proposes an algorithm for the protection of
accessible from a room specially designed for this; now with the
copyright in anaglyph 3D images,by inserting an invisible color
necessary accessories it is possible to enjoy 3D content
watermark in the frequency domain, employing the Discrete
anywhere, even at home. However, this ease of access and
Cosine Transform (DCT) and Quantification Index Modulation
visualization of 3D content also provides the facility to illegal
(QIM) [17] with its variant Dither Modulation (DM) [IS].
copying and distribution, so a technique for the protection of
copyright in the digital content, which must preserve the quality First, the 3D anaglyph image is converted from RGB to
of the original 3D content is needed. YCbCr color space, then only the luminance channel Y is
selected; the watermark is converted to YCbCr and the Chroma
One of the techniques most widely used to solve the problem
subsampling (4:2:0) process is performed, with the objective to
of copyright of digital contents in transmitting, processing and
reduce the information of watermark to minimum, whereby only
storing, is digital watermarking; which consists in embedding
12 bpp (bits per pixel) are needed instead of 24 bpp. The next
information into the digital content to be protected, it is
step is to calculate the DCT to each SxS block, and the
important that the embedding process does not cause serious
watermark is embedded using the QIM-DM algorithm. Finally
degradation on the original digital content; additionally, the
the mCT is applied on each SxS watermarked block, and the
protected material must be robust to common degradations, i.e.,
originals Cb and Cr channels are jointed with the protected
digital compression, noise, copying. Digital watermarking
luminance channel Y'. Experimental results show that this
techniques are classified as visible or invisible, and may be used
scheme is quite robust against JPEG compression,impulsive and
to authenticate the author, who is the original owner of the
Gaussian noise; the main contribution of this work is the
digital content [1]. When inserting a digital watermark one
insertion and extraction of a color watermark in 3D images,
should care about certain characteristics as capacity, robustness
which remains a challenge to date.
and imperceptibility [2].
The rest of this paper is organized as follows: Section two
Anaglyph images are based on the binocular vision
provides information about DCT and Section three shows the
phenomenon which was patented by Louis Ducos in IS91 [3].
algorithm of Quantization Index Modulation. In section four we
Anaglyph contains two images filtered by color, one for each
explain the watermark embedding and extraction procedures.
eye. When viewed through special glasses, a three-dimensional
Section five presents the experimental results which illustrate
978-1-4673-7839-0/151$31.00 ©20151EEE
2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), Mexico, City.
Mexico
the imperceptibility and robustness of the scheme. Finally, ftN-1�
Section six concludes the paper and proposes some future work. 2 (2i + 1)krr
xCi) IV C(k)x(k)cos (2)
II. DISCRETE COSINE TRANSFORM (DCT)
=
2N [ ]
The Discrete Cosine Transform (DCT) is an operation based
where:
on the Discrete Fourier Transform (DFT), but it only acts on
k = 0,1,2, ...,N-1
periodic functions with symmetrical pair and the result is a
i = 0,1,2, ...,N-1
sequence of real numbers, in terms of the sum of the cosine
function; it is the most used one in image compression, because
it has a good energy compaction property. Another important The number of operations performed by the one-dimensional
aspect of the DCT is the property to quantifY the coefficients DCT is lower and the processing time and the computational
using quantization values. The coefficients of the resulting cost goes down considerably [19].
correlation are very important, since further processing may be III. QUANTIZATION INDEX MODULATION (QIM)
performed independently.
In 2001 Brian Chen and Gregory W. Wornel proposed a new
Because the functions of the two-dimensional DCT are method of watermarking, which they called "Quantization
products of two one-dimensional functions, the only constant Index Modulation (QIM)". From the test they prove the
feature (DC coefficient) is in the upper left comer of the matrix effectiveness of this algorithm, and demonstrate that this kind
(Fig. 1). of watermarking is quite robust against distortions, in addition
to have a very good performance [17], [20], [21]. The main
AC (28)
property of this method is to embed information by modulating
r--r---r----r---,---.--...,...., / a sequence of indexes with the watermark and then quantifY the
host signal with the quantifier or quantifier sequence index
associated with the watermark [IS].
A. Dither Modulation
It is important to consider that Dither quantifiers have the
property that their quantization values and points of
reconstruction of any existing quantifier in the set, are different
versions of the quantization values and points of reconstruction
of the other existing quantifiers, each quantization index has its
own point of reconstruction [IS].
Fig. I. DCT coefficients.
Dither quantifiers refer to a single quantifier base and
gradually replace the other quantifiers by pseudo-random noise.
An M x N image is usually divided into non-overlapping
For this you can use dither vectors and gradually replace these
blocks, each one of size L x L. For simplicity the rows and quantifiers, these vectors are generated pseudo-randomly. To
columns of an image, and also the block, are assumed to be the make the insertion into an image, it is necessary to modulate
same size. In general, they have been used in blocks of size SxS
each of the vectors with the watermark to be inserted. This
image codification. These blocks allow you to enter small
generates a dither vector d(m) for each of the values contained
adaptive features based on existing activity or detail in the block.
in the watermark. Finally, the host image is quantized by the
A. 2-DCTusing two i-DCT initial quantizer base q(.) and the marking function is given by
(3).
One of the properties of the two dimensional DCT is that it
is separable and it is possible to obtain the same result using two (3)
sex; m) q ( x + d(m)) - d(m).
=
one-dimensional DCTs. To get the same result, first the one
dimensional DCT is applied to the rows and of the resulting To obtain the marked signal s the first thing to do is to add
matrix is applied again but now a one-dimensional DCT on the the dither vector d(m) to the sample x of the host image, then
columns getting the same result as if we use two-dimensional quantifY with the closest reconstruction point, finally the same
DCT. This same process applies to the mCT. dither vector d(m) is subtracted.
fl
inverse of DCT (2).
A. insertion Method.
2
N-l
(2i + l)krr The host anaglyph image Ah is converted from RGB (A�GB)
X(k) e(k) b x(i)cos (1) to YCbCr (A�CbCT). From YCbCr color space (A�CbCT) only the
=
B. Extraction Method.
The proposed color watermark extraction algorithm is
totally blind, this means that the extraction process does not
require any additional information as: original anaglyph image,
original color watermark, nor additional data. The block
Chane Is CbCr diagram for watermark extraction is show in Fig. 4.
Anaglyph A�b A�T
35
Where the parameters dmin1 and dmin2 are calculated as
iD
follow:
�
z
30
(f)
0-
dmin1 =
(( d[k, 0]
-
AWC i + tJ, -
) ) *
tJ,
- d[k,O]
(8)
25
_
dmin2 -
(( AWC i +
d[k, 1]
-
tJ,
-
) ) * tJ, - d[k,l] (9) 20
are two dither values obtained by (6) and 11 is the distance Fig. 5. Robustness against Gaussian noise.
between those dither values. The length L depends on the
number of coefficients that are selected from A�i' Impulsive Noise
il \ �, I'
in the next section were obtained from the following images:
Backpack, Classroom1, Flowers, Motorcycle, Pipes and
. . ( ,4f-,� j. \ ( '�
Playroom. All images were resized to a standard size of
�)
3648x2736 pixels, and the watermark (Lena) has a resolution
.. I
of 456x342. The average time of watermark insertion was 12.31
seconds and the average watermark extraction time was 6.23
seconds. a)
�' .
b)
TABLEL PSNR AND SSIM VALUES OF WATERMARKED 3D ANAGLYPH IMAGES AT DIFFERENT JPEG COMPRESSION RATIOS
TABLE n. PSNR, SSIM AND NCD VALUES OF RECOVERED WATERMARK LENA FROM DIFFERENT JPEG COMPRESSION RATIOS
50
� :-"' " c ,
31.99/0.7217/0.146 31.72/0.7257/0146 32.06/0.7294/0136 31.00/0.6965/0.146 32.04/0.7205/0.146 30.37/0.6648/0136
�
30 20.28/0.2525/0.153 20.20/0.2461/0.210 20.23/0.2492/0.153 20.23/0.2408/0.152 20.33/0.2511/0.210 21.06/0.2863/0153
--,
,IJ
bo' )
, ., ..
\.' . .� .
� ..·�
\ .
\ " ", /3
.�. .
'
. .'
. ' .
. :�.
" �I '
� -
�
i
'
",
(
/3; �c - f
' '
' . '
.
,
. (' �" ( ,
' ;.�.
, - a) b)
a) bl
I ��. , ! . �,
� \ iJ.'·"
I 4J )�
\ .�
�'(' . �. _ , �" '" "
. ; :'; '::'
•
• ,. r·
r • ' , .. ,
. . . -
c) d)
c) d)
Fig. 8. Watermark recovered after applying impulsive noise attack Fig. 9. Watermark recovered after applying different JPEG compression
a) density = 0.0001, b) density = 0.0003, c) density = 0.0005, d) density = 0.001 qualities a)QF = 85, b) QF = 70, c)QF = 50, d)QF = 30
2015 12th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), Mexico, City.
Mexico
VI. CONCLUSIONS [8] Yu-Hsun Lin; Ja-Ling Wu, "A Digital Blind Watermarking for Depth
Image-Based Rendering 3D Images", Broadcasting, IEEE Transactions,
In this paper an algorithm for copyright protection in 2011, Volume: 57, Issue: 2, Pages: 602 611, DOl:
anaglyph 3D images based on the invisible insertion of a color 10.1109ffBC.2011.2131470
image as a watermark is presented; the proposed method is based [9] Zadokar, S.R.; Raskar, V.B.; Shinde, S.V., "A digital watermarking for
mainly on the QIM-DM technique that has proven to be efficient anaglyph 3D images", Advances in Computing, Communications and
Informatics (ICACCI), 2013 International Conference, Pages: 483 - 488,
when applied to several algorithms of watermarking; the use of DOl: 10.1I09/1CACCI.20I3.6637219
a color image as a watermark, is a significant challenge to the
[10] Mei Yu, Aihong Wu, Ting Luo, Gangyi Jiang, Wujie Zhou, Songyin Fu,
methods of invisible watermarking, due to the large amount of "A New Stereo Image Watermarking Method for 3D Media", Original
information to be embedded into the host image, this challenge Research Article Procedia Engineering, Volume 29, 2012, Pages 2399-
is mitigated by chroma subsampling of the color image, which 2404, doi:I 0.1 016/j.proeng.2012.01.322
reduces by half the number of bits required to represent each [II] Bhatnagar G, Wu J, Raman B. "A robust security framework for 3D
color pixel. The proposed system achieves high imperceptibility images", J Visual 2011;14(1):85-93.
with average values of PSNR and SSIM of 41.36 dB and 0.9966 [12] Yury F. Luchko, Hector Martinez, Juan J. Trujillo, "Fractional Fourier
respectively; as well as high robustness against ] PEG Transform and some of its applications", Fractional Calculus & applied
Analysis, vol. II, number 4, pages 457-470, 2008, ISSN 1311-0454.
compression attacks, impulsive noise and Gaussian noise; even
[13] B.Chandra Mohan, S. Srinivas Kumar, "A Robust Image Watermarking
the color watermark could be recovered up to a JPEG Scheme using Singular Value Decomposition", Journal of Multimedia,
compression of 70%, obtaining average values of PSNR, SSIM vol. 3, no. I, pages 7-15, May. 2008.
and NCD 41 dB,0.9090 and 0.061 respectively for the recovered [14] Ivy Prathap, R. Anitha, "Robust and blind watermarking scheme for three
color watermark. Implementing two one-dimensional DCTs dimensional anaglyph images", Computers & Electrical Engineering,
instead of a bi-dimensional DCT significantly reduces the Volume 40, Issue I, January 2014, Pages 51-58,
insertion and extraction time,up to a factor of 10. Moreover,this doi:10.1016/j.compeleceng.2013.11.005
proposal uses a totally blind extraction scheme, where original [15] Lee MH, Hou J. Fast block inverse jacket transform. IEEE Signal Process
Lett 2006; 13(8):461-4.
anaglyph image, original color watermark, or additional data,
are not required for the correct extraction of the color watermark [16] Lee MH, Finlayson K. A simple element inverse Jacket transform coding.
IEEE Signal Process Lett 2007;14(5):325-8.
image. Also it is important to mention,that there is not a similar
[17] Brian Chen, Gregory W. Wornell, "Quantization Index Modulation: A
proposal in the literature, which embeds a color image as a Class of Provably Good Methods for Digital Watermarking and
watermark into a 3D anaglyph image, and the experimental Information Embedding", IEEE Transaction on Information Theory,
results clearly demonstrate that the proposed scheme achieves VOL. 47, NO. 4, MAY 2001.
excellent image quality and robustness. [18] Brian Chen and Gregory W. Wornell, "Dither modulation: a new
approach to digital watermarking and information embedding", Research
Laboratory of Electronics, arid Department of Electrical Engineering and
Computer Science Massachusetts Institute of Technology Cambridge,
ACKNOWLEDGMENT MA 02139, January 1999.
The authors are thankful to the Instituto Politecnico [19] Dr. Naim Dahnoun, "Chapter 18 Discrete Cosine Transform", Bristol
University, Texas Instruments, 2004
Nacional,BEIFI Projects 20151241 and 20151522,CONACYT
[20] Mendoza-Noriega, J.A., Kurkoski, B.M., Nakano-Miyatake, M., Perez
560086 and COFAA, for providing financial support for this
Meana, H., "Halftoning-based self-embedding watermarking for image
work. authentication and recovery", 53rd IEEE International Midwest
Symposium on Circuits and Systems (MWSCAS), pp. 612-615, Aug.
2010
[21] Avila, C.S. and Miyatake, M.N., "Multipurpose Image Watermarking
REFERENCES
Scheme Based on Self-Embedding and Data Hiding into Halftone Image",
[I] Podi1chuk, c.i.; Delp, E.J., "Digital watermarking: algorithms and Electronics, Robotics and Automotive Mechanics Conference (CERMA),
applications", Signal Processing Magazine, IEEE 2001, Volume: 18, 2010, pp. 394-398, Oct. 2010.
Issue: 4 Pages: 33 - 46, DOl: 10.1109179.939835 [22] D. Scharstein, H. HirschmOller, Y. Kitajima, G. Krathwohl, N. Nesic, X.
[2] M.L. Miller, I.J. Cox, M. G. Linnartz, T. Kalker, "A review of Wang, and P. Westling. High-resolution stereo datasets with subpixel
watermarking principles and practices". 1999. accurate ground truth. In German Conference on Pattern Recognition
[3] Ian P. Howard,Brian J. Rogers, "Binocular Visiond and Stereopsis", (GCPR 2014), MOnster, Germany, September 2014.
Oxford University Press, 1996, Print ISBN-13: 9780195084764,
DOl: 10.1 093/acprof:oso/9780195084764.001.0001
[4] Ming Luo; Bors, A.G., "Surface-Preserving Robust Watennarking of 3-D
Shapes", Image Processing, 2011, Volume: 20, Issue: 10 Pages: 2813 -
2826, DOl: 1O.1I09ffIP.2011.2142004
[5] Hua Deng; Lei Chen; Jifu Zhang; Rui Wang, "A 3D Model Watermarking
Algorithm Resistant to Affine Transformation", Multimedia Information
Networking and Security (MINES), 2012 Fourth International
Conference, Pages: 549 - 551, DOl: 10.1109/MINES.2012.11
[6] Ben Jabra, S.; Zagrouba, E., "A Robust and Blind 3D Mesh Watermarking
Driven by Stable Regions", Computer Technology and Development,
2009. ICCTD '09. International Conference, Pages: 381 - 385, DOl:
10.1 I09/ICCTD.2009.31
[7] Vasic, B., "Blind QIM-LDPC watermarking of 3D-meshes",
Communications Workshops (ICC), 2013 IEEE International Conference,
Pages: 702 - 706, DOl: 10.1 I 09/1CCW.201 3.6649324