Elsevier

Pattern Recognition Letters

Volume 26, Issue 10, 15 July 2005, Pages 1405-1411
Pattern Recognition Letters

Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model

https://doi.org/10.1016/j.patrec.2004.11.027Get rights and content

Abstract

In this paper we propose a new approach to predict a fixed fidelity level of a watermarked image while increasing the detection rate. The new approach incorporates a DCT block-based algorithm with human visual system (HVS). The performance of the new approach has been defined in terms of its effectiveness (detection rate) and fidelity. We show experimentally how our novel approach can be used to control distribution of a watermark to get a higher detection rate as well as better fidelity.

Introduction

There are numerous digital watermarking algorithms in the literature. Digital watermarking is a technique, which embeds data (mark) in digital and analog content in order to identify, track, manage and enhance the usefulness of such content (Watson, 1993a, Piva et al., 1997). Digital watermark is an invisible structure embedded into the host media. To be effective, a watermark must be imperceptible within its host (Watson, 1993a), discrete to prevent unauthorized removal, easily extracted by the owner, and robust to distortions. According to the literature in this field, many watermarking techniques for images and video were proposed, mainly focusing on the invisibility of the watermark and its robustness against various signal manipulations and hostile attacks (Piva et al., 1997, Eggers et al., 2000, Osberger et al., 1998, Kim et al., 1999, Degullaume et al., 2002, Hartung and Kutter, 1999).

Nowadays, there is a trend towards approaches that make use of information about the HVS to produce a more robust watermark. Such techniques use explicit information about the HVS to exploit the limited dynamic range of the human eye. In order to design an optimal digital watermarking algorithm or to optimize an existing digital watermarking algorithm it is important to take the HVS into account. Therefore, our novel model takes advantages of the HVS and incorporates it with DCT-block based algorithm. To recognize the effects of such a system on a digital watermarking algorithm, a brief introduction to the HVS is given in Section 1.1.

The retina of our eye splits a visual signal into different components and each component excites the visual cortex via separate channels (Watson, 1993b, Wolfgang et al., 1999a, Osberger et al., 1998, Kim et al., 1999). Each component has the following characteristics: the spatial location in the image, the frequency of the image, and the orientation of the signal (horizontal, vertical, or diagonal).

Based on the knowledge of the structure of the human eye and human visual system, a hypothetical cortex transform (Wolfgang et al., 1999a) has been devised that models the known properties. When two signals have similar component characteristics, they excite the same channel in the cortex but are subject to the masking effect. Masking occurs when the detection threshold is increased because of the presence of another stronger signal with similar characteristics. However, human perception mechanisms are not uniform. For example, the response of the HVS varies with the spatial frequency, brightness, and color of its input. This suggests that all components of a watermark may not be equally perceptible. Perceptual variation can be measured, and models constructed to account for them. A perceptual model generally attempts to account for three basic types of phenomena: sensitivity, masking, and pooling (Miller et al., 2001). Detailed description of these phenomena can be found in (Podilchuck and Zeng, 1997, Bartolini et al., 1998, Miller et al., 2001, Wolfgang et al., 1999a, Wolfgang et al., 1999b).

The paper is organized as follows: Section 2 presents the concept of incorporating the HVS model with the DCT block-based algorithm and Section 3 describes the testing procedure. Section 4 presents the experimental results and finally, Section 5 discusses conclusions and proposes future research problems worth investigating.

Section snippets

Incorporating a DCT block-based algorithm with HVS mathematical model

This section presents the concept of incorporating the HVS model with the DCT block-based algorithm.

To achieve a desired performance level for the block-based algorithm, four factors must be optimized as shown in (Eyadat, 2003, Eyadat, 2004). Experiments show that optimizing a number of factors at time can be expensive and sometimes an exhausting procedure. Therefore, we proposed a method to overcome this problem by incorporating the block-based algorithm with the HVS model and suggested that

Testing procedure

To demonstrate the effects of the incorporation of HVS into the block-based algorithm, our experiment is performed using the block-based algorithm developed by Cox and Millen (1997) and Cox et al. (1996). The algorithm is tested by embedding three different watermarks, one at a time, into five gray scale images (256 × 256 pixels) using two embedding schemes and under the JPEG compression standard. The experiment is performed twice, once without incorporating the HVS and a second time with the

Results

A comparative study of the results of the block-based algorithm before and after incorporating with the human visual system model is presented.

The results are presented at two levels: the first level demonstrates the results of the criterion evaluation using one of the three watermarks. The second level summarizes the experiment results of the evaluation criterion under the three different watermarks before and after incorporating the HVS and also it discusses the detection rate and the

Conclusion

As a conclusion, incorporating the HVS improved the performance of the block-based algorithm significantly by retaining the fidelity level and increasing the detection rate. In addition, it provides evidence to confirm the results of our novel contribution. We propose two future research problems; first, testing the proposed approach by using the discrete wavelet transform (DWT) algorithm, second, extending Watson’s visual model to the DWT domain.

References (17)

  • Bartolini, F., Barni, M., Cappellini, V., Piva, A., 1998. Mask building for perceptually hiding frequency embedded...
  • I.J. Cox et al.

    A review of watermarking and the importance of perceptual modeling

    Proceedings of Electronic Imaging

    (1997)
  • Cox, I.J., Kilian, J., Leighton, T., Shamoon, T., 1996. Secure spread spectrum watermarking for images, audio and...
  • Degullaume, F., Vvoloshyvovskiy, S., Pun, T., 2002. Method for the estimation and recovering from general affine...
  • Eggers, J.J., Su, J.K., Girod, B., 2000. A blind watermarking scheme based on structured codebooks. In: Secure Images...
  • Eyadat, M., 2003. Comparative evaluation of watermarking algorithm embedding schema. Ph.D. Thesis, Claremont Graduate...
  • Eyadat, M., 2004. Factors that affect the performance of the DCT-block based image watermarking algorithms. In:...
  • F. Hartung et al.

    Multimedia watermarking techniques

    Proceedings of the IEEE

    (1999)
There are more references available in the full text version of this article.

Cited by (18)

  • Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

    2015, Signal Processing
    Citation Excerpt :

    If a user redistributes the fingerprinted copy, it is possible to track him/her down by finding his/her fingerprint within the content. Fingerprinting methods should meet the following requirements of imperceptibility and robustness of the embedded fingerprints, both are discussed in great detail in [1–6], and scalability in terms of construction and distribution of fingerprinted multimedia. Scalability of construction refers to the complexity and number of operations performed by the distribution side to generate and to embed fingerprints in the data in order to serve all users.

  • Interpolated Implicit Pixel-based Novel Hybrid Approach Towards Image Steganography

    2023, Recent Advances in Electrical and Electronic Engineering
  • CDF based dual transform approach for UAV video visual enhancement in RGB model

    2022, International Journal of System Assurance Engineering and Management
View all citing articles on Scopus
View full text