Do you know zero-watermarking??

Zero-watermarking is a technique for copyright protection. In general, the feature data of the content are encrypted with the copyright data to generate ownership share. The master share is the feature data of the content itself. The master share is registered to certification authority for copyright confirmation. When required, the copyright data can be retrieved by decrypting of the master share and the ownership share. Since zero-watermarking does not embed the watermark information into the digital content, the quality of the processed content is not degraded.

We explain the proposal of zero-watermarking using robust VMF (visual map feature). The main idea is to combine the QR decomposition with the 1D-DCT for constructing the robust share files of the zero-watermarking. By using the proposed VMF and PVMF, we easily improve the robustness of zero-watermarking and reduce the computation cost of the proposed methods.

スクリーンショット 2016-05-06 1.24.46.png

Fig 1. Overview of VMF

Generation of VMF

The overview of our proposed VMF method is shown in Fig. 1. Suppose C\mathbf C is image feature generation function. Four steps that involved in C\mathbf C to generate the VMF is explained as follows:

  • Convert the RGB image II to YUV color space. Divide Y-component into the non-overlapping blocks B\mathbf B of size 8×88\times 8. The number of non-overlapping blocks is N/8N/8.
  • Apply QR decomposition on each non-overlapping block B\mathbf B to obtain R0\mathbf R_0.
\mathbf B = \mathbf Q \mathbf R,

where Q\mathbf Q is m×nm\times n matrix and R\mathbf R is an upper triangular matrix. Let B\mathbf B and Q\mathbf Q are described as

$\mathbf B=[\mathbf b_1, \mathbf b_2, ..., \mathbf b_n]$


$\mathbf Q=[\mathbf q_1, \mathbf q_2, ..., \mathbf q_n]$

, respectively, where bi\mathbf b_i and qi\mathbf q_i are column vector.

  • Apply 1D-DCT on each R0\mathbf R_0 to retrieve the DC coefficients F(i),i=0,1,,N/8F(i), i=0, 1, \cdots, N/8.
  • Two consecutive DC coefficients are compared to generate the VMF of the original image. This VMF is used as the master share MM (Fig 1 (b)) and each point of MM is generated by comparison of F(i)F(i) and F(i+1)F(i+1):
M(x,y) = \left\{ \begin{array}{rl}
 1 &\mbox{ if $F(i+1) > F(i)$}, \\
 0 &\mbox{ otherwise},
       \end{array} \right.

where x,y[0,N/8)x,y\in [0,N/8).

Therefore, MM is generated by M=C(I)M= \mathbf C (I). The visibility of MM can be observed by Fig 1(b). MM holds the robust edge feature of the original image.

Construction of ownership share

The ownership share OO (Fig 1(d)) is generated by encryption of the master share MM with the copyright data WW (Fig 1(c)). To obtain the ownership share OO, we apply the XOR operation between MM and with WW as follows:

O=M\oplus W, ~O_p=M_p\oplus W.

Copyright identification

Suppose the property dispute concerning the suspected image II' happens. The CA should judge the rightful owner of the suspected image. The CA asks the owner to provide the secret key and extracts the master share MM' of II' by using the same algorithm. That means M=C(I)M'= \mathbf C (I')

In case of VMF-based method, CA can obtain the watermark WW' as follows:

 W'=M'\oplus O = \mathbf C (I') \oplus \{\mathbf C (I) \oplus W\} \nonumber \\ \Rightarrow ~W'=W \mbox{ if } \mathbf C (I')=\mathbf C (I).

According to WW', CA can judge the rightful owner of the suspected image.

Experimental results

To assess the performance of the proposed algorithm, we conduct ten color images of the well known SIDBA (Standard Image Data-BAse) database\footnote{http://decsai.ugr.es/cvg/index2.php}. All test images are with size N×N=512×512N \times N = 512\times512 pixels. The conducted images are shown in \figref{original}. The watermark image is a binary image with size L×L=64×64L\times L = 64\times 64 which is shown in Fig 1(c).

スクリーンショット 2016-05-06 1.44.08.png

Fig 2. Original images

In order to evaluate the quality of watermarked images, we employ PSNR (Peak Signal to Noise Ratio) criterion. The PSNR of N×NN\times N pixels image of I(i,j)I(i,j) and I(i,j)I'(i,j) is calculated as follows:

    &&\hskip-1em PSNR = 20\log\frac{255}{MSE}\ \ \ \ \ {\rm [dB]},\\
    &&\hskip-1em MSE = \sqrt{\frac{1}{N\times N}\displaystyle \sum^{N-1}_{i=0}\sum^{N-1}_{j=0}\{I(i,j)-I'(i,j)\}^2},\nonumber \\
    &&\hskip-1em (MSE: \mbox{Mean Square Error}).\nonumber

To judge the robustness, we use the normalized correlation (NC) value between the original watermark WW and the extracted watermark W{W'}. The NC value is calculated as follows:

   NC = \frac{\displaystyle\sum_{i=0}^{L}\displaystyle\sum_{j=0}^{L} [W(i,j)\times W'(i,j)]}{\displaystyle\sum_{i=0}^{L}\displaystyle\sum_{j=0}^{L}[W(i,j)]^2},

where L×LL \times L is the size of WW.

Attacked evaluation

スクリーンショット 2016-05-06 1.47.01.png

Fig 3. Attacked results

The proposed method is robust against almost the attacks in Fig 3 since the average NC values are over 0.8. Therefore, our method can be applied for the copyright protection applications. Ours is more robust against only `rotation and crop', cropping, and tampering attacks as compared to the method of Rani et al.et~al.. The reason is that our VMF can be remained under those attacks whereas the feature of Rani et al.et~al. may be strongly affected.

スクリーンショット 2016-05-06 1.51.07.png

Fig 4. NCs

Some extracted watermarks using the distorted Lena images are shown in Fig 4. The corresponding distorted images are shown in Fig 5. It includes the Photoshop software processing (Pixelize and Puzzle). It is clear that our VMF is more superior than Rani et al.et~al. in some cases.

スクリーンショット 2016-05-06 1.53.03.png

Fig 5. Attacked images


In this work, we have proposed a zero-watermarking method based on the encryption of VMF with the copyright information. In our methods, the original image is not affected by watermark embedding. The watermark size is also not limited. Since our proposed method preserve the feature of entire image, therefore, it especially is robust against strong cropping and tampering attacks. Certainly, it can resist against the common processing and geometric attacks. Moreover, the consuming time of our methods is lower than \cite{Rani2}.

All Rights Reserved

Let's register a Viblo Account to get more interesting posts.