Abstract
A real-time watermarking scheme with high robustness and security has been proposed based on modulating the log-scaling magnitudes of DCT coefficients, which is most suitable for JPEG images and MPEG streams. The watermark bit is encoded as the sign of the difference between the individual log-scaling magnitude of a group-region and the average one of all group-regions. The log-scaling magnitude can be modulated by modifying the low and middle frequency DCT coefficients imperceptibly. The robustness of scheme is not only dependent on those largest coefficients, but also on the other coefficients with the same proportion. It can embed 512 bits into an image with a size of 512×512, which can satisfy the payload requirement of most video watermarking applications. Moreover, the watermark embedding process only requires one-sixth of the time consumed during normal playing of video, and the watermark detection only requires one-twelfth of that, which can meet the real-time requirements of most video watermarking applications. Furthermore, the experimental results show that the presented scheme is transparent and robust to significant valumetric distortions (including additive noise, low-pass filtering, lossy compression and valumetric scaling) and a part of geometric distortions. It performs much better than the EMW algorithm in resisting all kinds of distortions except Gaussian noise with a larger deviation.
Similar content being viewed by others
References
Costa M. Writing on dirty paper. IEEE Trans Inform Theory, 1983, 29(3): 439–441
Eggers J J, Su J K, Girod B. A blind watermarking scheme based on structured codebooks. IEE Colloquium (Digest), 2000, 39: 27–47
Chou J, Pradhan S, Ramchandran K. A robust blind watermarking scheme based on distributed source coding principles. In: Ghandeharizadeh S, Chang S-F, Fischer S, et al. eds. 8th ACM International Conference on Multimedia (ACM Multimedia 2000). New York: ACM Press, 2000. 49–56
Chen B, Wornell G W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inform Theory, 2001, 47(4): 1423–1443
Miller M L, Doerr G J, Cox I J. Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans Image Proc, 2004, 13(6): 792–807
Langelaar G C, Lagendijk R L, Biemond J. Real-time labeling of MPEG-2 compressed video. J Visual Comm Image Represent, 1998, 9(4): 256–270
Lu C-S, Chen J-R, Liao H-Y M et al. Real-time MPEG2 video watermarking in the VLC domain. In: Suen C, eds. Proceedings of 16th International Conference on Pattern Recognition. New York: IEEE Press, 2002. 552–555
Hartung F, Girod B. Watermarking of uncompressed and compressed video. Signal Processing, 1998, 66(3): 283–301
Langelaar G C, Lagendijk R L. Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans Image Proc, 2001, 10(1): 148–158
Setyawan I, Lagendijk R L. Low bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm. In: Ping W W, Edward J D, eds. Security and Watermarking of Multimedia Contents III. San Jose: SPIE Press, 2001. 73–84
Ling H, Lu Z, Zou F. Improved differential energy watermarking (IDEW) algorithm for DCT encoded image and video. In: Yuan B, eds. International Conference on Signal Processing Proceedings (ICSP’2004). New York: IEEE Press, 2004. 2328–2331
Ling H, Lu Z, Zou F. New real-time watermarking algorithm for compressed video in VLC domain. In: International Conference on Image Processing (ICIP’2004). New York: IEEE Press, 2004. 2171–2174
Ling H-F, Lu Z-D, Zou F-H. Turbo-based DNW algorithm for compressed video in VLC domain. Wuhan Univ J Natur Sci, 2005, 10(1): 297–302
Ling H, Lu Z, Zou F. Watermarking scheme based on energy modulation for compressed video. In: International Symposium on Communications and Information Technologies (ISCIT’2005). New York: IEEE Press, 2005. 873–876
Ling H, Lu Z, Zou F, et al. Energy modulated watermarking algorithm based on Watson perceptual model. J Software (in Chinese), 2006, 17(5): 1124–1132
Watson A B. DCT quantization matrices visually optimized for individual images. In: Allebach J P, Rogowitz B E, eds. Human Vision, Visual Processing, and Digital Display IV. San Jose: SPIE Press, 1993. 202–216
Cox I J, Miller M L, Bloom J A. Digital Watermarking. San Francisco: Morgan Kaufmann Publishers, 2002. 107–125
Miller M L, Bloom J A. Computing the Probability of False Watermark Detection. In: Pfitzmann A, eds. Proceedings of the Third International Workshop on Information Hiding. Berlin: Springer, 1999. 146–158
Alghoniemy M, Tewfik A H. Geometric invariance in image watermarking. IEEE Trans Image Proc, 2004, 13(2): 145–153
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (Grant No. 60502024), and the Natural Science Foundation of Hubei Province (Grant No. 2005ABA267)
Rights and permissions
About this article
Cite this article
Ling, H., Yuan, W., Zou, F. et al. Log-scaling magnitude modulated watermarking scheme. SCI CHINA SER F 50, 470–490 (2007). https://doi.org/10.1007/s11432-007-0022-9
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s11432-007-0022-9