Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/9006
標題: 整合多路徑遞迴碼與跨方塊展頻的影像浮水印系統
Integration of Multiple-Description Iterative Coding and Inter-Block Spread Spectrum in Image Watermarking System
作者: 夏英峰
Hsia, Ying-Fen
關鍵字: 影像浮水印;Image watermark;直序展頻;跳頻展頻;跨方塊;多路徑遞迴編解碼;多路徑純量量化;Direct sequence spread spectrum;Frequency hop spread spectrum;Inter-block;Multiple descriptions iterative coding;Multiple description scalar quantization
出版社: 電機工程學系所
引用: [1] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997. [2] I. J. Cox, M. L. Miller, and A. L. McKellips, “Watermarking as communications with side information,” Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999. [3] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,” IEEE Trans. Image Processing, vol. 9, no. 1, pp. 55-68, Jan. 2000. [4] Q. Cheng and T. S. Huang, “An additive approach to transform-domain information hiding and optimum detection structure,” IEEE Trans. Multimedia, vol. 3, no. 3, pp. 273-284, Sept. 2001. [5] H. S. Malvar and D. A. F. Florencio, “Improved spread spectrum: a new modulation technique for robust watermarking,” IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 898-905, Apr. 2003. [6] Q. Cheng and T. S. Huang, “Robust optimum detection of transform domain multiplicative watermarks,” IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 906-924, Apr. 2003. [7] A. Nikolaidis and I. Pitas, “Asymptotically optimal detection for additive watermarking in the DCT and DWT domains,” IEEE Trans. Signal Processing, vol. 12, no. 5, pp. 563-571, May 2003. [8] A. Briassouli and M. G. Strintzis, “Optimal watermark detection under quantization in the transform domain,” IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 12, pp. 1308-1319, Dec. 2004. [9] A. Briassouli and M. G. Strintzis, “Locally optimum nonlinearities for DCT watermark detection,” IEEE Trans. Image Processing, vol. 13, no. 12, pp. 1604-1617, Dec. 2004. [10] J. Zhong and S. Huang, “An enhanced multiplicative spread spectrum watermarking scheme,” IEEE Trans. Circuits and Systems for Video Technology, vol. 16, no. 12, pp. 1491-1506, Dec. 2006. [11] J. Zhong and S. Huang, “Double-sided watermark embedding and detection,” IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 297-310, Sept. 2007. [12] D.-J. Wang, T.-Y. Chen, T.-H. Chen, and S.-W. Lin, “A novel multipurpose image watermarking scheme based on block-relation,” International Journal of Innovative Computing, Information, and Control, vol. 3, no. 5, pp. 1161-1172, Oct. 2007. [13] W. Liu, L. Dong, and W. Zeng, “Optimum detection for spread-spectrum watermarking that employs self-masking,” IEEE Trans. Information Forensics and Security, vol. 2, no. 4, pp. 645-654, Dec. 2007. [14] Z. Zhang, Y. Zhao, “Multiple Description Image Coding Based on Fractal,” International Journal of Innovative Computing, Information and Control, vol. 3, no. 6(B), pp. 1615-1623, 2007. [15] C. Chang, C. Lin and Y. Hu, “An SVD oriented watermark embedding scheme with high qualities for the restored images,” International Journal of Innovative Computing, Information and Control, vol. 3, no. 3, pp. 609-620, 2007. [16] J. H. Gass, Jr., and M. B. Pursley, “A comparison of slow-frequency-hop and direct-sequence spread-spectrum communications over frequency-selective fading channels,” IEEE Trans. Commun., vol. 47, no. 5, pp.732-741, 1999. [17] Q. Gu and T. Gao, “A novel reversible watermarking algorithm based on wavelet lifting scheme,” ICIC Express Letters, vol.3, no.3 (A), pp.397-402, 2009. [18] J. Pan, C. Zhang and Q. Guo, “Image enhancement based on the shearlet transform,” ICIC Express Letters, vol.3, no.3 (B), pp.621-626, 2009. [19] Y. Zhang, C. Zhang J. Chi and R. Zhang, “An algorithm for enlarged image enhancement,” ICIC Express Letters, vol.3, no.3 (B), pp.669-674, 2009. [20] F. Mintzer and G. W. Braudaway, “If one watermark is good, are more better?,” Proc. IEEE International Conf. on Acoustics, Speech, and Signal Processing, 1999, Phoenix, Arizona, USA, vol. 4, pp. 2067-2069, Mar. 1999. [21] C.-T. Hsu and J.-L. Wu, “Hidden digital watermarks in images,” IEEE Trans. on Image Processing, vol. 8, no. 1, pp. 58-68, Jan. 1999. [22] H.-C. Huang, F.-H. Wang, and J.-S. Pan, “A VQ-based robust multi-watermarking algorithm,” IEICE Trans. Fundamentals, vol. E85-A, no. 7, pp. 1719-1726, Jul. 2002. [23] G.-F. Gui, L.-G. Jiang, and C. He, “A robust asymmetric watermarking scheme using multiple public watermarks,” IEICE Trans. Fundamentals, vol. E88-A, no. 7, pp. 2026-2029, Jul. 2005. [24] G. Boato, F. G. B. De Natale, and C. Fontanari, “Digital image tracing by sequential multiple watermarking,” IEEE Trans. on Multimedia, vol. 9, no. 4, pp. 677-686, Jun. 2007. [25] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit digital watermarking robust against local nonlinear geometrical distortions,” Proc. International Conf. on Image Processing 2001, Thessaloniki , Greece, vol. 3, pp. 999-1002, Oct. 2001. [26] P. Bas, J.-M. Chassery, and B. Macq, “Geometrically invariant watermarking using feature points,” IEEE Trans. on Image Processing, vol. 11, no. 9, pp. 1014-1028, Sep. 2002. [27] C.-W. Tang and C.-W. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. on Signal Processing, vol. 51, no. 4, pp. 950-959, Apr. 2003. [28] C.-S. Lu and C.-Y. Hsu, “Near-optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding,” IEEE Trans. on Circuits and Systems for Video Technology, vol 17, no. 4, pp. 454-467, Apr. 2007. [29] V. A. Vaishampayan, “Design of multiple description scalar quantizers,” IEEE Trans. on Information Theory, vol 39, no. 3, pp. 821-834, May 1993. [30] J.-S. Pan, Y.-C. Hsin, and H.-C. Huang, “Robust image watermarking based on multiple description vector quantization,” Electronics Letters, vol. 40, no. 22, pp. 1409-1410, Oct. 2004. [31] M.-L. Day, S.-Y. Lee, and I.-C. Jou, “Robust multirate lattice quantization index modulation watermarking resilient to multiple description transmission channel,” Optical Engineering, vol. 46, no. 3, p. 037005, Mar. 2007. [32] M.-L. Day, S.-Y. Lee, and I.-C. Jou, “Multiple description watermarking based on quantization index modulus modulation,” Journal of Information Science and Engineering, vol. 23, no. 6, pp. 1785-1800, Nov. 2007. [33] M. Srinivasan, “Iterative decoding of multiple descriptions,” Proc. Data Compression Conference, Snowbird, Utah, USA, pp. 463-472, Mar. 1999. [34] F. Gray, Pulse Code Communications, U.S. Patent 2632058 (1953). [35] Y.-F. Hsia, C.-Y. Chang and J.-R. Liao, “Multiple-description coding for robust image watermarking,” IEEE Int. Conf. on Image Processing, Singapore, vol. 1, pp. 2163-2166, Oct. 2004. [36] Y.-F. Hsia, J.-R. Liao and C.-H. Hsu, “Inter-block direct-sequence and frequency-hop spread spectrum image watermarks,” International Journal of Innovative Computing, Information and Control, accepted for publication. [37] Y.-F. Hsia and J.-R. Liao, “Multiple-description iterative coding image watermarking,” Digital Signal Processing, accepted for publication.
摘要: 
嵌入多重浮水印是增加強健影像浮水印的一個方法。因為影像的容量通常是非常有限的,嵌入多重浮水印,嚴格地限制浮水印的大小。多路徑編解碼透過在傳輸頻帶寬和誤碼率之間作取捨,是解決上述問題的一好選擇。傳統上,多路徑編解碼是被考慮在開關通到,在那裡不會被誤碼毀損,但是被偶爾的連接中斷,如遺失封包。為了應用多路徑編解碼在影像浮水印,我們需要多路徑編解碼對於雜訊通道的形式以取代開關通道。本論文,為了對抗誤碼在影像浮水印裏,我們提出加遞迴編解碼進多路徑。我們稱這個方法為多路徑遞迴編解碼(MDIC)影像浮水印。我們在六張影像上測試了我們的系統。平均,誤碼直到我們壓縮了圖像在JPEG上到PSNR 36.97 dB才發生。我們認為,MDIC對於影像浮水印是一個非常好增加強健的方法。
最普遍的浮水印嵌入方法之一,是直序展頻(DSSS)法。原始的DSSS技術劃分影像成NxN區塊。這些區塊由離散餘弦變換(DCT)變換。然後,隨機雜訊(PN)序列被嵌入在區塊內被選擇DCT係數。本論文,我們在基於DCT展頻浮水印上,探討另外二個論點,那是在先前研究未探索過的。第一個論點是我們稱為「Inter-block」方法。在先前DSSS浮水印演算法,PN序列的一輸入位元被嵌入一個區塊,我們叫這種方法「Intra-block」。另一方面,我們可以嵌入PN序列入幾個不同的區塊,我們稱它「Inter-block」方法。這種「Inter-block」方法的理論基礎是它在影像裡開展同一位元進入一個更寬的區域。這更寬開展也許是有利於浮水印反擊。第二個論點是跳頻展頻(FHSS)的使用。先前的研究指出在特定通道情況下,FHSS表現比DSSS好,但FHSS只用於音頻浮水印。所以,應用FHSS浮水印在影像上值得探討。
要學習上述二個論點,我們開發三種影像浮水印演算法。他們叫「Intra-block FHSS」,「Inter-block DSSS (IDSSS)」和「Inter-block FHSS (IFHSS)」。這三個方法和原始的DSSS或者「Intra-block DSSS」透過他們被各式各樣的浮水印攻擊做比較。從實驗結果,我們有以下發現。「Inter-block」技術在對抗所有攻擊,表現較好。對於濾波和量化攻擊,IDSSS浮水印表現較好。對於幾何失真攻擊,IFHSS浮水印表現較好。為了善加利用從這二種不同方法得到的優點,我們結合IDSSS和IFHSS成為單一浮水印系統,稱為Inter-Block Combined (IBC)系統,並且測試它。結果顯示,IBC可抵抗寬廣範圍的浮水印攻擊。
最後,我們把上述MDIC和IBC二個系統結合一起,建造一個全新的架構,稱為CMDIC浮水印系統。實驗結果顯示,CMDIC可抵抗更寬範圍的浮水印攻擊。

To embed the multiple watermarks is a way to increase robustness in image watermark. The limitation of embedding multiple watermarks is that the limited capacity of an image severely limits the size of the watermark. Multiple-description coding is a good candidate to solve this limitation by trading off between transmission bandwidth and bit error rate. Traditionally, multiple-description coding is considered in on-off channels where channels are not marred by bit errors but occasional connection outages such as dropped packets. To apply multiple-description coding in image watermarking, we need a form of multiple-description coding for noisy channels instead of on-off channels. In this thesis, we propose to add iterative coding in multiple descriptions in order to combat bit errors in image watermarking. We call this method multiple-description iterative coding (MDIC) image watermarking. We tested our system on six images. On average, bit error did not happen until we compressed the image in JPEG to PSNR 36.97 dB. We concluded that MDIC was a very good way to increase robustness for image watermarking.
One of the most popular watermark embedding methods is the direct sequence spread spectrum (DSSS) method. The original DSSS technique divides the image into NxN blocks. These blocks are transformed by discrete cosine transform (DCT). Then, the pseudo-noise (PN) sequences are embedded in selected DCT coefficients within the blocks. In this thesis we explore another two aspects in spread spectrum DCT-based watermarks that are yet unexplored in previous researches. The first aspect is what we called “inter-block” method. In previous DSSS watermark algorithms, the PN sequence from one input bit is embedded in one block. We called this approach “intra-block”. On the other hand, we can embed the PN sequence into several different blocks. Thus, we called it “inter-block” method. The rationale for this “inter-block” approach is that it spreads the same bit into a wider region in the image. This wider spreading may be beneficial in watermark counter-attack. The second aspect is the use of frequency-hop spread spectrum (FHSS). Previous researches indicated that FHSS performed better than DSSS in certain channel condition but FHSS has only been used in audio watermarks. Therefore, applying FHSS watermarks in images is worth investigating.
To study the above two aspects, we developed three image watermark algorithms. They are called “intra-block FHSS”, “Inter-block DSSS (IDSSS)” and “Inter-block FHSS (IFHSS)”. These three methods and the original DSSS or “intra-block DSSS” were compared by subjecting them to various watermark attacks. From the experiments, we have the following findings. “Inter-block” techniques perform better against all attacks. For filtering and quantization attacks, IDSSS watermarks performed better. For geometric distortion attacks, IFHSS watermarks performed better. In order to utilize the advantages from these two different approaches, we combined IDSSS and IFHSS into a single watermark system, called Inter-Block Combined (IBC) system, and tested it. The results showed that the IBC can resist a broad range of watermark attacks.
Finally, we combined the above two systems, MDIC and IBC, together to construct a whole new architecture, called combined MDIC or CMDIC watermarking system. The experimental results showed that CMDIC can defend a wider scope of watermarking attacks.
URI: http://hdl.handle.net/11455/9006
其他識別: U0005-3004201010485500
Appears in Collections:電機工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.