1. Trang chủ
  2. » Ngoại Ngữ

Digital watermarking robust to print and scan process

115 217 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 115
Dung lượng 8,11 MB

Nội dung

DIGITAL WATERMARKING ROBUST TO PRINT-AND-SCAN PROCESS Zhou Zhicheng NATIONAL UNIVERSITY OF SINGAPORE 2004 DIGITAL WATERMARKING ROBUTS TO PRINT-AND-SCAN PROCESS Zhou Zhicheng (B.Eng.(Hon.) in Computer Science, USTC) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE 2004 Acknowledgement The writing of this paper has received deep concerns and valuable help from my advisors Dr. Qibin Sun and A/P Ee-chien Chang, whose kind encouragement, generous patience, and pertinent criticisms have guided me throughout the whole research work and the formation of this thesis. Their broad knowledge, deep insight, serious attitude and research enthusiasm benefited me a lot in conducting my research work and will surely guide me for the future challenge. I also want to show my sincere gratitude to my friends: Dajun He, Shuiming Ye, Zhishou Zhang, Zixiang Yang, Xinglei Zhu, and Rong Zhang, for their continuous encouragement, valuable discussion and kind advice. I will always remember the time we spent together with joy and harmony like a big family. Finally, allow me to show my deep thanks to my family for their consistent encouragement and support. Their deep love is the incentive force for my progress. Special thanks go to my wife for sharing my joy and sorrows all the time. i Publications Shuiming Ye, Zhicheng Zhou, Qibin Sun, and Qi Tian, A Quantization-Based Image Authentication System, Fourth International Conference on Information, Communications & Signal Processing, Fourth IEEE Pacific-Rim Conference On Multimedia, Singapore, December 2003. Qibin Sun, Dajun He, Zhicheng Zhou, and Shuiming Ye, Feature Selection for Semi-fragile Signature-based Authentication Systems, International Conference on Information Technology: Research and Education, Newark, New Jersey, August, 2003. ii Table of Content Acknowledgement..........................................................................i Publications ...................................................................................ii Summary ......................................................................................vi List of Figure..............................................................................viii List of Table .................................................................................xi Chapter 1 Introduction ................................................................1 1.1 Digital Watermarking .........................................................................................3 1.1.1 Overview of Digital Watermarking ...................................................................3 1.1.2 Models of Digital Watermarking .......................................................................7 1.2 Print-and-Scan Process .....................................................................................10 1.3 Motivation.........................................................................................................12 1.4 Organization of thesis .......................................................................................13 Chapter 2 Printer and Scanner .................................................15 2.1 Working Principles of Printer ...........................................................................15 2.2 Working Principles of Scanner .........................................................................21 2.3 Related Work on Watermarking .......................................................................23 2.4 Summary ...........................................................................................................26 Chapter 3 Noise of Print-and-Scan Process .............................28 iii 3.1 Introduction.......................................................................................................28 3.2 Properties in Pixel Domain ...............................................................................32 3.3 Properties in DCT Domain ...............................................................................37 3.4 Summary ...........................................................................................................44 Chapter 4 Watermarking Algorithm........................................46 4.1 Original DEW ...................................................................................................47 4.1.1 Watermark Embedding ....................................................................................48 4.1.2 Watermark Extracting......................................................................................52 4.2 Our Watermarking Scheme ..............................................................................53 4.2.1 Watermark Embedding ....................................................................................56 4.2.2 Watermark Extracting......................................................................................61 Chapter 5 Experiments and Discussions ..................................64 5.1 Side Effect of RST Distortion...........................................................................66 5.2 Optimal Parameters for Watermarking.............................................................69 5.2.1 Energy Threshold for Watermark Extracting ..................................................70 5.2.2 Quality Factor for Watermark Embedding ......................................................73 5.2.3 Energy threshold for watermark embedding ...................................................76 5.2.4 Cutting Index Cmin .........................................................................................77 5.2.5 Number of blocks in one GOB ........................................................................80 5.3 Performance Comparison .................................................................................84 5.3.1 Fidelity .............................................................................................................85 5.3.2 Robustness .......................................................................................................87 5.4 Summary ...........................................................................................................93 iv Chapter 6 Conclusion and Future Work..................................94 6.1 Conclusion ........................................................................................................94 6.2 Future Work ......................................................................................................95 v Summary After decades of development, the research of digital watermarking has advanced greatly in many ways. Many digital watermarking systems are robust to the ordinary image processing techniques like lossy compression, cropping, scaling, and rotation. However, digital watermarking that is robust to D\A and A\D transformation, such as print-and-scan process, still lacks full investigations. In general, the print-and-scan distortion includes two types of distortions: Rotation, Scaling and Transformation (RST) distortion and pixel value distortion. However, many existing research only focuses on the former distortion because the pixel value distortion is difficult to be perfectly modeled. In this thesis, we explore the property of pixel value distortion and present a watermarking scheme robust to this distortion. From the investigation on the noise property of the print-and-scan process, we find that the smooth blocks get less distorted during this process. Watermark embedded in these blocks is probably more robust to the print-and-scan distortion. However, protecting the texture blocks from distortion is also necessary because the watermark extractor within this blind watermarking scheme also uses these texture blocks. For this reason, we design the noise adding operation to compensate the print-and-scan distortion to the texture blocks. In addition, the watermark extractor also affects the whole system performance, so we use the multiple-vote operation to enhance the robustness of water extractor. The rules of the multiple-vote operation are specially designed based on the property of the print-and-scan distortion. The experiment results show that this watermarking scheme is robust to print-and-scan distortion for a variety of images having different texture contents. vi Furthermore, the comparison between this scheme and the differential energy watermarking scheme (DEW) shows that our special designed operations are effective for improving the watermark robustness to print-and-scan distortion. vii List of Figure Figure 1.1 Classification of Digital Watermarking ............................................................ 6 Figure 1.2 Watermarking Model I: Watermark as Noise ................................................... 7 Figure 1.3 Watermarking Model II: Watermark as Noise and Side Information ............... 8 Figure 1.4 Watermarking Model III: Watermark as Transmitted Messages ...................... 9 Figure 2.1 Basic Components of Laser Printers ............................................................... 17 Figure 2.2 Dot Gain Effect of Printers.............................................................................. 18 Figure 2.3 Gamma Correction. TOP: Gamma Error, BELOW: Gamma Correction ....... 20 Figure 2.4 Basic Components of Flatbed Scanners .......................................................... 22 Figure 3.1 The Print-and-scan Copy of 'Lena' with Supplemental Marks....................... 29 Figure 3.2 'Lena' and 'Baboon' .......................................................................................... 31 Figure 3.3 Projection Map Between Original and Scanned Images ................................. 33 Figure 3.4 Distortion Map Between Original and Scanned Images ................................. 35 Figure 3.5 Projection Maps of Different Copies of Scanned 'Lena' ................................. 36 Figure 3.6 Pixel Distortions Between Original Lena and Gaussian-Noised 'Lena' .......... 36 Figure 3.7 Zig-zag Scan Order of DCT Coefficients........................................................ 38 Figure 3.8 Absolute Distortions in Low & High Frequency ............................................ 40 Figure 3.9 Distortions of DC Coefficients, TOP: increased; BOTTOM: decresed.......... 42 Figure 3.10 The Blocks Whose Energies are Decreased by Print-and-Scan .................... 42 Figure 3.11 Magnitudes of Different Types of Distortions .............................................. 44 Figure 4.1 DEW Watermark Embedding Scheme............................................................ 48 Figure 4.2 Shuffled Images: 'Lena'(LEFT) & 'Baboon'(RIGHT) ..................................... 48 viii Figure 4.3 Creation of GOB in DEW ............................................................................... 49 Figure 4.4 DEW Watermark Extracting Scheme.............................................................. 52 Figure 4.5 Modified Watermark Embedding Scheme ...................................................... 57 Figure 4.6 Slices of the Shuffled Images: 'Lena' (LEFT) & 'Baboon' (RIGHT) .............. 58 Figure 4.7 PSNR of Different Print-and-Scan Images ..................................................... 59 Figure 4.8 Print-and-Scan Copies of 'Lena': Original(LEFT); Noise Adding(RIGHT) ... 60 Figure 4.9 Modified Watermark Extracting Scheme........................................................ 62 Figure 5.1 Bit Error Rates for Different RST ................................................................... 68 Figure 5.2 Watermarked 'Lena' and 'Baboon' ................................................................... 71 Figure 5.3 Bit Error Rates for Different G........................................................................ 72 Figure 5.4 PSNR of Watermarked Images for Different Q .............................................. 74 Figure 5.5 Watermarked Images for Q=45....................................................................... 74 Figure 5.6 Watermarked Images for Q=65....................................................................... 75 Figure 5.7 Bit Error Rates for Different Q........................................................................ 76 Figure 5.8 Bit Error Rates for Different E ........................................................................ 77 Figure 5.9 PSNR of Watermarked Images for Different Cmin ........................................ 79 Figure 5.10 Bit Error Rates for Different Cmin................................................................ 80 Figure 5.11 Watermarked Images for Different n. UP: M=8, BELOW: M=0.12 ............ 82 Figure 5.12 PSNR of Watermarked Images for Different n ............................................. 83 Figure 5.13 Bit Error Rates for Different n ...................................................................... 84 Figure 5.14 PSNRs for All Test Images ........................................................................... 86 Figure 5.15 Watermarked 'Flower's of DEW (LEFT) and Our Scheme (RIGHT)........... 87 Figure 5.16 Robustness Comparison for DEW and our Scheme on 'Lena' ...................... 88 ix Figure 5.17 Robustness Comparison for DEW and our Scheme on 'Baboon'.................. 89 Figure 5.18 Robustness Comparison for DEW and our Scheme on 'Fruit'....................... 90 Figure 5.19 Robustness Comparison for DEW and our Scheme on 'Flower' ................... 91 Figure 5.20 Robustness Comparison for DEW and our Scheme on 'Girl'........................ 92 Figure 5.21 Robustness Comparison for DEW and our Scheme on 'Women'.................. 92 x List of Table Table 3.1 Means of Different High Frequency Distortions .............................................. 43 Table 5.1 Parameters for Experiment of RST Side Effect................................................ 67 Table 5.2 Bit Error Rate for Different RST ...................................................................... 67 Table 5.3 Parameters for Experiment 1 ............................................................................ 70 Table 5.4 Parameters for Experiment 2 ............................................................................ 73 Table 5.5 Parameters for Experiment 3 ............................................................................ 76 Table 5.6 Parameters for Experiment 4 ............................................................................ 77 Table 5.7 Bit Error Rates for Different Cmin................................................................... 79 Table 5.8 Parameters for Experiment 5 ............................................................................ 80 Table 5.9 PSNR of Images in Different n......................................................................... 81 Table 5.10 Parameters for experiment 6 ........................................................................... 85 xi Chapter 1 Introduction The great development of the computer network in the past decades, including LAN, WAN, Internet and wireless network, enables fast and convenient communications between people. At the same time, the duplicate or edit of the multimedia objects in high quality and fidelity becomes easier as the digital multimedia technologies advance. However, this ease of distributing and modifying the media objects introduces new problems to the copyright protection. Cryptography is the first technology applied to protect the transmitted digital multimedia content. The basic idea behind cryptography is to encrypt the plaintext to the ciphertext, and then send it to the receiver. Only the receiver having the corresponding decryption function can get the plaintext back from the ciphertext. However, this framework only protects the information during transmission. After the multimedia object is decrypted, it may still be freely distributed by the receiver. Therefore, this object is not under protection any more. Digital watermarking is the technology for complementing the shortage of the cryptographic framework. Its general idea is to embed the identification 1 information into the multimedia content and associate them tightly. By this means, the distributed multimedia content always carries the embedded information. Digital watermarking and cryptography have very different requirements, as they have different goals. For cryptography, robustness refers to security, which evaluates how good the algorithm is for protecting the encrypted information from being known by the attackers who have no decryption keys. Nevertheless, robustness in digital watermarking has different meanings: protecting the embedded watermarks from being removed when the image content is not changed. In other words, the attackers to the digital watermarking have no interest in knowing the content of watermark, but want to make it fail to work properly. Research on the robustness of the watermarking system has been greatly investigated for all multimedia objects such as audio, image and video. For image watermarking, many schemes guarantee that the watermarking is robust to ordinary image processing operations such as scaling, cropping, rotation, transformation or lossy compression. However, little work has done on the image watermarking robustness to print-and-scan process. In some cases, the print-and-scan is also thought as the acceptable image processing techniques as it does not change the image content greatly. This thesis tries to understand the print-and-scan process and aims to design a watermarking scheme robust to the distortion comes from this process. This chapter begins with an overview of digital watermarking, and then introduces the mathematical models of watermarking. After that, the related research on digital watermarking robust to print-and-scan process is introduced. Finally the organization of the whole thesis is given. 2 1.1 Digital Watermarking 1.1.1 Overview of Digital Watermarking The history of watermarking can be traced back to several hundred years ago, when it was used mainly for trademark or decoration [1]. At that time, the watermark was created using chemical or physical methods during the process of paper manufacturing. It was not until 1954 when Emil Hembrooke invented the first digital presentation of the watermark [2]; and Komatsu and Tominaga used the term digital watermarking for the first time in 1988[1]. Then in the 1990's, interest on this research topic began to boost because the easy distribution of the media objects in computer networks introduces new problems on the copyright protection. After the decade of development, the application of digital watermarking is no longer restricted on the copyright protection. More and more applications of the digital watermarking are proposed, such as ownership protection, data monitoring and tracking, data authentication, and copy control etc. Although digital watermarking uses the term "watermarking", it only shares the invisible property with the traditional watermarking. The digital watermarking has more requirements than the traditional watermarking as it is used digitally. In fact, digital watermarking uses the similar techniques as the information hiding [3], which were utilized for secret communication between armies in wars thousands of years ago. Although Information hiding, steganography and digital watermarking are similar techniques in embedding information into multimedia objects, they have different goals and applications, resulting in different requirements. For example, commonly robustness is the main focus of digital watermarking, capacity is the main focus of information hiding 3 and secret communication is the main focus of steganography. [1, 3, 4] give the detailed explanation and comparison of these terms. Note that the requirement of a watermarking system is application-oriented; and some digital watermarking applications may take other factors into consideration but not only restrict in the robustness. In this thesis, we mainly focus on the robustness while keeping the appropriate watermark capacity and visual image quality. There are many perspectives to category the digital watermarking technologies. Figure 1.1 gives a coarse classification. Different types of media require different digital watermarking technologies. For instance, the real-time videos and audios need the fast watermark extracting, while images have less requirements on the speed of watermark extraction. Authors of [5] and [6] has detailed a comparison on the technologies for these media types. Though watermarking technologies can be classified by the property of perception, perceptible watermarking is only used in image and video applications but never used in audio. The reason comes from the different perception properties between the Human Visual System (HVS) and the Human Auditory System (HAS). HVS samples the multimedia object by a scalable means, perceives the information globally and neglects the locally visual distortion. But HAS samples every local signal instantaneously in a detailed scale, thus it is very sensitive to even locally audible distortion. Perceptible watermarking, or, visible watermarking, simply overlays a visual pattern on the image or video for watermark. This pattern generally is a trademark or a copyright logo, which claims the copyright ownership. The disadvantage of perceptible watermarking is that it distorts the original image or video content greatly. For this reason, imperceptible techniques become more and more popular. Imperceptible watermarking embeds the 4 watermark to the locations to which HVS or HAS is not sensitive. Then the modification introduced by the watermark embedding probably cannot be perceived by HVS or HAS. Spatial domain and frequency domain watermarking schemes differ in their embedding domains. In general cases, the frequency domain watermarking is more robust than the spatial domain watermarking. Embedding a watermarking bit in frequency domain is similar to distributing the energy of this bit uniformly to different pixels within spatial domain. Then the local spatial distortion only damages the watermark bit partially; and the information of this bit hidden in other locations is probably enough for correct watermark extraction. We will narrow our scheme within the imperceptible image watermarking in frequency domain. For different applications, the requirements of digital watermarking are different. The most common discussed properties are fidelity, capacity, robustness, and security. Fidelity refers to the perceptual similarity between the watermarked version and the original version of the host data; capacity refers to the amount of information that can be embedded within the host data without unacceptable distortion; robustness refers to the correct watermark detection even after the acceptable signal processing operations are done to the watermarked media; and security refers to the resistance to the malicious attack methods like the unauthorized removal, embedding, and detection. Although the tradeoff between these properties varies for different applications, robustness is fairly a common requirement for most of the watermarking applications. We are mainly concerned with the robustness, as well as the capacity and fidelity in this thesis. 5 Figure 1.1 Classification of Digital Watermarking After decades of research on digital watermarking, more and more applications are proposed and investigated. In general, these applications include ownership protection, data monitoring and tracking, data authentication, fingerprinting, copy/access control and media indexing etc [1, 2, 7]. Ownership protection, or copyright protection, aims to prove the ownership for a multimedia object by embedding the owner's information into it. How to identify the true watermark if more than two watermarks are embedded in the media is a problem for this application. The purpose of data monitoring and tracking is to find out whether the data is transmitted or broadcasted as required. For example, the total time of the advertisement broadcasted by a radio station or a television station must be summed for billing purpose. Data authentication determines whether the host media has been tampered. In authentication, the main concern is to prevent the tampered media object with a forged watermark to pass the authentication. Fingerprinting embeds different watermarks in the copies of a media object and distributes them to different customers. When any customer distributes his/her copy illegally, the owner of the multimedia object 6 can find out this pirate. Access control aims to restrict the user's access to the protected data according to his or her privilege. For example, the access control detector in the Video Cassette Recorder (VCR) can prohibit the VCR to record a watermarked video, when the embedded watermark declares this video as "never-copy". Indexing embeds distinct labels into the video contents, to facilitate the finding process of these media objects. 1.1.2 Models of Digital Watermarking In general, digital watermarking is modeled mathematically as a kind of digital communication [1, 8, 9, 10]. Watermarking system itself is a communication channel and the watermark is the information that is transmitted through this channel. To well understand the prototype of the watermarking systems, the discussion on their common models is necessary. Cox gives three communication models for digital watermarking in [1]. Among these models, the cover work plays different roles as pure noise, side information or transmitted message; watermark embedder and watermark detector play the same roles as modulator and demodulator. Figure 1.2 Watermarking Model I: Watermark as Noise 7 In the first model (Figure 1.2), the media object, i.e., the cover work C0, is thought of as the noise to the communication channel. Then the watermarked media Cw is the addiction of the encrypted watermark m and the cover work C0. The signal processing imposed on the watermarked media Cw is considered as another adding noise n to the communication channel. Watermark detector tries to eliminate the noise and get an estimate message mn of the input message m. If the cover work is known to the detector, this detector is called informed detector, otherwise it is called blind detector. The watermarking system having a blind detector is called blind watermarking system. Figure 1.3 Watermarking Model II: Watermark as Noise and Side Information In the second model (Figure 1.3), cover work C0 is regarded as the side information known to the transmitter of a communication channel. The embedding and detecting procedures of this model are similar to the first one. Similarly to the first model, the cover work C0 is still considered as the noise, but its noise effect can be minimized because the encoder also takes it as the side information. The encoder can expect and invert its noise effect in the watermark embedder side before it is added to the channel [1, 8]. 8 Figure 1.4 Watermarking Model III: Watermark as Transmitted Messages In the third model (Figure 1.4), cover work is no long considered as the noise of the channel, but another message to be transmitted along with the watermark message through the channel. This watermarking model multiplex watermark and cover work into the same transmission channel, and de-multiplex them at the receiver. Traditional communication model only has one de-multiplexing module, which separates the messages by different values of a specific parameter. The common parameters used in the multiplexing communication are time, frequency, or code sequence. Nevertheless, watermarking model uses two independent modules, i.e. the human perception and the watermark detector, to de-multiplex the transmitted information. Besides these communication models, Cox suggests a geometric model for digital watermarking [1], in which the watermark and cover work are regarded as vectors in high-dimensional spaces. The watermarked object is the cumulative vector of the watermark vector and the cover work vector. That is, watermarking can be considered as moving some vector to a specific space. In this thesis, I would like to model watermarking as a multiplexed communication. 9 1.2 Print-and-Scan Process As we are concerned with the digital watermarking robust to print-and-scan process, we need to know what the print-and-scan process is, and the property of the noise it adds to the image. The whole print-and-scan process is: printing the image of digital format onto a paper, and scanning this paper to get back the digital image. Intuitively, this process is a kind of D/A A/D transformation, and the noise of this process comes mainly from the transformation between digital format and analogue format. Nevertheless, because many uncontrolled and unexpected distortion is introduced in the print-and-scan process, the model of print-and-scan noise is more complex than the simple D/A A/D transformation. In general, the print-and-scan process includes two kinds of distortions: geometric distortion and pixel value distortion [17]. Geometric distortion is a severe attack to the synchronization of a blind digital watermarking system. Typical geometric distortion includes rotation, scale, and translation (RST) applied globally to the whole image. These operations do not change the image content, but only change the image's orientation, scale or position. Besides these global geometric distortions, Khun and Petitcolas proposed a benchmark StirMark to attack the watermark by the local geometric distortions while keep the image content with no globally visual alternations [11]. Much research work has been performed on global RST distortions, and these techniques generally fall into two categories. The first category inverts the geometric distortion and then extracts the watermark [12, 13, 14]. Pereira et al proposed to embed a template into the middle-frequency FFT spectrum of the image for reference; then inverted the geometrical transformation according to the change of this 10 template and extracted the watermark [13]. Kutter proposed to repeat the watermark bits to different locations in a pattern; then localized this pattern by a correlation function, identified and inverted the affine transformation, and extracted the watermark [14]. The second category finds a transform space that is invariant to the RST distortion and embeds the watermark directly within this space for better synchronization [15, 16]. Ruanaidh and Pun proposed to embed watermark within the Fourier-Mellin transform [15]. To get this transform space for an image, Fourier transform (FFT), log-polar mapping (LPM), and Fourier transform (FFT) are taken in sequence. Nevertheless, the basic idea of this technique is based on the continuous FFT, which is hard to calculate for discrete format images. Lin et al proposed another method to get the weaker but simpler invariant domain for watermarking in [16]. Similarly to Pun's scheme, this scheme also takes the FFT and LPM in the first stage, but after that a projection to the angle axis in log-polar coordinate rather than another FFT is taken. In this domain, the image is invariant to translation and scaling, and cyclic-shift to rotation. Although the image in this domain is not invariant to rotation operation, the watermarking detector in his scheme knows the original watermark, and an exhaustive search can find the translation angle to compensate the rotation operation. In contrast to the plenty of research on RST, there is less research investigating the properties of pixel value distortion and the watermarking robust to it. Lin gave a general model for the pixel value distortion of print-and-scan process in [17]. Although the detailed formulas of this model are not given, all types of noise involved in the print-and-scan process have been taken into consideration. Nevertheless, this model needs the calibration for different setting of printer and scanner. Thus it is not common for all the 11 printers and scanners. Zhu et al [18] proposed to use the pixel distortion of print process as the signature for authentication of the printed document, because the distortions to the same pattern in different print process are unique [18]. This reveals that the print-and-scan distortion is time-variant. The security of their schemes is based on truth that the resolution of the microscope used for watermark extraction can be very high, while the printer can not provide such resolution to counterfeit the unique printed pattern. This asymmetry guarantees that the extraction of the print signature is easy to implement while the reproduction is almost impossible. In general, the pixel value distortion of print-and-scan is a nonlinear, content dependent and time-variant function. To reduce or invert its affect like what was done to geometric distortion in detailed granularity is difficult. Nevertheless, as the human eyes can recognize an original copy and a print-and-scan copy of the same image to be similar, it is intuitive that some feature space within an image can be robust to print-and-scan. In other words, in the print-and-scan context, feature space should be found in a coarse granularity. 1.3 Motivation There are many applications for watermarking robust to print-and-scan process. The authentication of documents needs this technique for some cases, such as authentication of passports, cheques, E-tickets or ID-cards. These types of images are simple in content, providing more space for embedding. The copyright protection for documents also needs this technique. For example, the photographers publishing their pictures of high quality in magazines might hope to claim their ownership. Or, the publishers purchasing the whole copyright of the photos might also hope to protect their copyrights and guarantee that these 12 photos are published under their permission. But there are few techniques to support these applications currently. On the other hand, the research on this topic still needs further investigations. Currently, the research that is related to the print-and-scan distortion mainly focuses on the rotation, scaling and transformation (RST) distortion, but not the pixel value distortion. However, a watermarking system supporting the above applications can not ignore this type of distortion. Thus the research on this topic is important and valuable. In this thesis, we intend to understand the properties of the pixel value distortion, and design a blind watermarking system that is robust to this print-and-scan distortion. As RST distortion is not our concern, we assume it is erased by other means before watermark extracting. For the design of watermarking system, our strategy is to find the stable feature space in the images for the print-and-scan process, and design a method to blindly embed the watermark in this space. To focus our research on the print-and-scan distortion, we only consider the watermarking for grayscale images. 1.4 Organization of thesis The whole thesis is organized as follows. Chapter 2 gives a detail introduction on the working principles of the printers and the scanners. In addition, the printer model and scanner model are discussed in this chapter. In chapter 3, we will discuss the property of the print-and-scan noise, based on the printer and scanner models. The results of the chapter 2 and chapter 3 give the basis to design a robust watermarking system. Chapter 4 discusses our watermarking system. This watermarking system is a variation of the Differential Energy Watermarking (DEW). Chapter 5 presents the experiment results to 13 evaluate the robustness of our watermarking system to print-and-scan distortion. The results include the robustness performance of our watermarking system for different images, and the comparison on the robustness between the original DEW and our system. 14 Chapter 2 Printer and Scanner To design a watermarking scheme robust to print-and-scan process, we need to know the working principles and the mathematical models of printers and scanners. In this chapter, we first introduce the working principles of the printers and scanners, then their mathematical models, and finally the previous research related to our desired watermarking scheme. Printers and scanners are the image input and output systems respectively. The optical principles of these imaging systems are presented in [19]. And the structural components and their functionalities are described in [20, 21]. To understand how they work, we need to know their internal components and how they coordinate. Based on the distortions introduced by different components within printers or scanners, we can get the distortion models. 2.1 Working Principles of Printer Printers can be categorized in several ways. For example, impact printers work by hitting a head or a needle against an ink ribbon to make a mark on the paper; while non-impact 15 printers exploit other techniques like the physical theories in optics and electronics to avoid these mechanical strikes[22]. Dot-matrix printers, daisy-wheel printers, and line printers belong to the impact printers, which are noisier than the non-impact printers like inkjet printers and laser printers. On the other hand, printers can be classified as contone printers and halftone printers [19]. Contone printers can print the continuous tone images directly, but they are more expensive. Halftone printers change a continuous tone image into a binary image (i.e. halftone image) and then print this binary image. Halftone printers are more popular because they are cheaper than contone printers while providing a similar quality. Because of their popularity, we will choose the non-impact half tone printers for experiment. In particular, we will use the laser halftone printers. Figure 2.1 illustrates the major components of a laser printer and its six-step print process [20]. Firstly, the photoreceptor drum is uniformly charged by the corona wires (1); then partially discharged by the laser beam (2). The laser beam is generated based on the image or the document that is printed, and the partially discharged area on the drum represents the printing area of the binary image. After that, the toner hopper coats the drum surface with the positively charged toners, which only adhere to the discharged area (3). The drum rolls over a paper that is negatively charged by another set of corona wires below it (4). As this charge is stronger than the negative charge on the drum in step (1), the toners are pulled away from the drum and adhered to the paper. The paper carrying the adhered black toners is then sent to a fuser, which melts the toners and fuses them with the paper tightly (5). In the last step, the charge on the surface of the drum is cleared up by a discharge lamp (6). The drum is then prepared well for the next printing. The optical and electronic devices, including the mirror, the laser generator and the corona wires, are the 16 delicate equipments. They do not generate noise during the printing process. But they are very sensitive to small movements. Even a very small dithering of the mechanical devices could introduce distortion to the printed images. This mechanical distortion is the random noise independent to the printed images. Figure 2.1 Basic Components of Laser Printers Besides the hardware distortion from mechanical devices, a printer also introduces the software noise of the digital-to-analog conversion. The laser printer uses digital halftoning technique to convert continuous-tone images to the half-tone images, which are represented by black and white dots only, before they are sent for printing. The laser beam is modulated based on this binary image, but not the original image of continuous tone. The image quality of a halftone image is similar to its original image, because the Human Visual System (HVS) tends to spatially integrate the intensities of the neighboring pixels 17 within an image. Haltoning represents the gray intensity of a pixel within the original image by a group of small dots. The gray intensity decides how the dark dots and white dots are distributed in this group. Details about choosing the pattern of black and white dots can be found in [23]. Viewing a halftone image, the HVS then integrates all the dots within this small group to recover the original gray level information of this pixel. Thus we perceive an average reflectance value R, which can be modeled by the Murray-Davies equation: R = F ⋅ RB + (1− F ) ⋅ RW (2.1) where F is the weighting factor, calculated as the fractional area coverage of the black dots, RB and RW is the reflectance values of black dots and the white paper respectively. The function of (2.1) is also called the tone transfer function. Given the pixels having the same gray intensity, F varies with respect to other surrounded pixels of different gray levels. The halftoning noise then is dependent on the image content, which is different to the independent noise of the mechanical devices. Figure 2.2 Dot Gain Effect of Printers If the printing process is perfect, the tone transfer function R in (2.1) is a linear function of the weighting factor F. However, in practice the tone transfer function is a nonlinear function, and the printed image is darker than expected (Figure 2.3 up). This is caused by another distortion called dot gain, which is defined as the dot-size increase when 18 the image is printed (Figure 2.2). In general, there are two types of dot gains: mechanical dot gain and optical dot gain. Mechanical dot gain (Figure 2.2 middle) comes from the physical spreading of the toners as they are fused into paper. Optical dot gain (Figure 2.2 right) refers to the optical growth of the dot-size, which comes from the trapping of the reflecting lights beneath the printed dot. The light (e.g. Light A) projected to the dot directly will be absorbed entirely and get no reflections. However, the reflections of some lights projected near the dot are also possible to be absorbed. For instance, light B in Figure 2.2 enters the paper, scatters laterally, and emerges under the dot. Thus, the dot has a higher probability to absorb the light than one would expect from the physical dot-size. It has an optical size larger than the physical size. Compensation of the dot gain is similar to gamma correction in CRT display device, because the transfer function of dot gain resembles the voltage-to-light curve, which is a power-law transformation, of a CRT [24]. The power-law transformation has the common form [25]: s = cr α (2.2) where c and α are positive constants. For common gamma errors of CRTs, 2.5 > α > 1.8 (Figure 1.1 Plot2), which will darken the image to lose the details. To invert the gamma errors, gamma correction calculate r ' = r device. Then s = cr 'α = cr 1 ⋅α α 1 α (Figure 1.1 Plot3) and sends r ' to the display = cr , the transfer function changes to a linear one after gamma correction. Figure 1.1 illustrates effect of gamma and gamma correction employed to the example image. In such cases, the tone transfer equation taking dot gain into account is modified as: R1 α = F ⋅ RB1 α + (1 − F ) ⋅ RW 1 α (2.3) 19 which is called Yule-Nielsen equation. Although this model seems perfect for correcting the dot gain, the calibration is needed for printers to find the different suitable parameter α . The noise introduced by gamma correction is not only content-dependent, but also nonlinear. Figure 2.3 Gamma Correction. TOP: Gamma Error, BELOW: Gamma Correction In [26], a noise model is proposed, which takes all the noise of halftoning, dot gain and mechanical dithering into consideration. However, this noise model is complicated and needs the calibration before it is employed to a printer. The calibration requires that the original image is available. This requirement, however, conflicts with our goal of designing a blind watermarking system. 20 2.2 Working Principles of Scanner There are also many types of available scanners, such as flying-spot scanner, drum scanner, and flatbed scanner, all of which are different from their mechanical sub-systems [27]. Most desktop scanners use charge-coupled device (CCD) arrays, photo-multiplier tubes (PMT) or Contact Image Sensor (CIS) as the light sensors. As CCD-based flatbed scanner is popular, we only discuss the principles and models of this kind of printer. The basic components of the flat bed scanners are the Charge-Coupled Device (CCD), lamp, and the analog-to-digital converter (ADC) (Figure 2.4). During the scanning process, a scan head inside the scanner moves across the flatbed slowly from one side to the other side. The moving scan head then samples the image to reconstruct its digital format. The scan head is made up with cathode fluorescent lamp, mirrors, lens and CCD array. The lamp illuminates the lights to the scanned image, and the reflection light is led to the CCD array by the mirrors and the lens. CCD is a collection of tiny diodes, which are able to convert photons (light) into electrons (electrical charge). The brighter the light that hits on a single diode, the greater the electrical charge will be generated at that diode. After the CCD array absorbs the lights reflected by the images, it generates the corresponding electrical voltage signals and sends them to an analog-to-digital converter (ADC). ADC then converts the analog signals into digital signals. The image processor processes the received digital signals to reconstruct the image and then send it to the PC for further processing. 21 Figure 2.4 Basic Components of Flatbed Scanners From the scanning process, we can find that the scanners noise comes from the following sources: vibration or movement of mechanical sub-system, dirt or bias of the optical sub-system, illuminant unbalance of the lamp, sensitive distortion of the CCD and sampling distortion of ADC. [19] gives a scanner sensor model for the response at a single spatial location: tis = ∫−∞ f i (λ ) d (λ ) r (λ ) ls (λ ) d λ + εi ∞ (2.4) where f (λ ) is the spectral transmittance of the color filters, d (λ ) is the sensitivity of the detector (i.e. CCD) used in the measurement, ls (λ ) is the spectral radiance of the illuminant(i.e. lamp), r (λ ) is the spectral reflectance of the area being scanned, εi is the measurement noise, and tis denotes the value obtained from the ith channel. This model concerns the light and color parameters in the high degree of details. In [27], the author gives a coarser model for the CDD array output: 22 g ( x, y ) = ⎡⎣ f ( x, y ) ∗ h ( x, y )⎤⎦ ⋅ s ( x, y ) (2.5) where f ( x , y ) is the input image, h ( x , y ) is the sensor aperture response, and s ( x, y ) is the sampling function. Actually, g ( x, y ) is the convolution of f ( x , y ) and h ( x , y ) , which is then multiplied by the sampling function s ( x, y ) . Both models suggest that the scanning process is similar to convolution, where the high components of the images are erased. That is, the scanner produces a blurred copy for the printed document. These models indicate that the scanner noise is content-dependent and nonlinear, which is similar to the printer noise. 2.3 Related Work on Watermarking Due to the variations in the print-and-scan process, the research in literature only partially solve the problems related to the watermarking that is robust to print-and-scan process. As previous research on the rotation, scaling and transformation (RST) has been introduced in chapter 1. In this section, we will review the related work exploring the pixel value distortion of print-and-scan process. Cox [10] proposes a watermarking scheme exploiting the idea of spread spectrum idea used in digital communication. The watermark bits wi are embedded to the coefficients ci in the frequency domain with the strength α by: ci ' = ci (1 + αwi ) i = 1,..., n (2.6) To enhance the robustness of the watermarking scheme, ci are selected from the n most significant coefficients of the frequency domain. The watermark then is extracted by 23 wi * = (ci * − ci ) α (2.7) where ci* is the coefficients at the same location as ci . Note that it may be distorted by other sources before the watermark extraction. This method is claimed to be robust to many attacks including the pixel value distortion of the print-and-scan process. However, the assumption of this watermarking is very strong: the original image must be available when the watermark is extracted. Under this assumption, the unwanted noise can be erased by referring to the original image. Thus this assumption is impractical for many applications. The techniques similar to Cox's scheme are proposed in [28, 29]. To develop a watermarking system robust to print-and-scan process, Lin models the pixel distortion in print-and-scan process in [17]: I '( x , y ) = K ( I ( x , y ) *τ ps ( x, y ) + ( I ( x, y ) *τ h ( x, y )) ⋅ N 1 ) ⋅ s( x, y ) (2.8) I(x,y) is the intensity value at the position (x, y) of the original image I, I'(x,y) is the intensity value of the distorted image. τ ps ( x, y ) is the global point spread function, which is the convolution product of the printer spread function τ p ( x, y ) and the scanner spread function τ s ( x, y ) : τ ps ( x, y ) = τ p ( x, y ) *τ s ( x, y ) (2.9) τ h ( x, y ) is the high-pass filter, representing the high noise variance near the edges and N1 is a white Gaussian random noise. Lin claims that τ h ( x, y ) is not symmetric in the vertical and horizontal directions, since the scan head moved by a step motor will introduce the directional jitter noise. s ( x, y ) is the sampling function, K(I) is the responsive function: 24 K ( I ) = α ⋅ ( I − β I )γ + β K + N 2 ( I ) (2.10) This function models the noise of A/D, D/A and the gamma adjustments in the printer and scanner. This model is similar to the printer and scanner models mentioned in section 2.1. Lin proposes to estimate the parameters α , γ , βx and βk in equation (2.10) by the optimal MSE(Mean Square Error). The watermarking scheme in this paper is designed mainly for the robustness to RST distortion. It is similar to O'Ruanaidh 's in [15], which embeds the watermark in the Fourier-Mellin transform domain of the image. It differs from O'Ruanaidh 's scheme in using the discrete-fourier transform instead of the continuous fourier transform when calculating the Fourier-Mellin transform. However, this method also needs the original image for reference to calibrate the estimated parameters of the print-and scan models. Lin’s experiment results mainly focus on the rotation, scaling and cropping (RSC) distortion of print-and-scan, and lack the evaluation on the system robustness to the pixel value distortion. In [18], Zhu et al design an authentication system by utilizing the random property of the printing process. Though this watermarking system is not designed for the robustness to print-and-scan, it demonstrates the time-variant property of the print-and-scan process. It is claimed that the randomness in the printing process of the same content is non-repeatable, and propose to use this unique randomness as the robust feature to embed watermark for document authentication. To embed the watermark, an predefined print pattern is firstly printed out on the document; then a digital microscope is used to extract the print signature from this printed pattern; the print feature is then combined with the critical information about the document to generate the specific digital signature (specific print and specific document); this digital signature is finally printed as 25 the barcode on the document finally. To authenticate the document, we need to repeat the above feature extraction on the printed pattern to get the new extracted feature, which is then combined with critical information to generate the new digital signature. This new digital signature is then compared with the old one that is printed as the barcode to get the final authentication decision. The security of their digital watermarking framework is provided by the asymmetry of examining and reproducing the printed pattern. It is easy to get the shape profiles (i.e. extracted signature) of the printed pattern by the cheap microscope with high resolution. But a printer that is able to reproduce the same printed pattern needs extremely high resolution, which can not be achieved even by the best printer at present. Therefore, the leakage of security leak seems impossible in a practical sense. However, this method is very sensitive as a high resolution microscope is used to get the extracted signature. Every unintentional distortion to the printed pattern on an authenticated document would lead to authentication failure. For example, if the E-ticket is folded just across the printed pattern, then its new extracted feature is probably different from the original one and the authentication fails. Furthermore, the printed pattern needs to be protected during watermark embedding. The second print that generates the bar code of the digital signature would probably distort it. This paper reveals the time-variant property of the print-and-scan noise. This noise is not integrated into the printer and scanner models introduced in the previous sections of this chapter. 2.4 Summary In this section, we introduce the working principles of the laser-printers and the flatbed CCD-based scanners and highlight their mathematical models suggested by different 26 researchers. We also discuss some other digital watermarking schemes related to the print-and-scan process. From the above discussion, we can find that the noise model of the print-and-scan process is complex. It is a type of content-based, nonlinear and time-variant noise. It is impossible to totally erase this noise if the original image is not available. Even the print-and-scan model can only estimate the noise, and needs the original image for calibration before it is put into use. Therefore, to design a blind watermarking system, we can not use these models directly. At least, the strategy to erase the noise or to calibrate the models is unacceptable. We choose another strategy by looking for the stable feature space within the images for print-and-scan noise and them embedding the watermark into this space. This type of feature space should get the least distortion from the print-and-scan process, and the watermark embedded in this space can be preserved well and robust to print-and-scan distortion. 27 Chapter 3 Noise of Print-and-Scan Process As discussed in the chapter 2, print-and-scan process is a content-based, nonlinear, and time-variant noise channel. The complex print-and-scan model needs the original image for calibrating its parameter values before it can be applied to estimate the noise. But this requirement can not be achieved as we aim to design a blind watermarking system. That is, the mathematical models of printers and scanners can not be used directly in our watermarking system. These models can only guide us to find more common property of the print-and-scan distortion for different images. In this chapter, we try to find this common property by the experimental means. To fully understand the print-and-scan noise, we analyze it in both pixel domain and frequency domain in the following sections. 3.1 Introduction As we do not take the rotation, scaling and transformation (RST) distortion into considerations in this thesis, we need to avoid it by other methods. We register the print-and-scan image to its original image manually. For example, we add some supplemental marks for reference near the edges or the corners of an image before it is 28 printed (see Figure 3.1); and register the distorted image to the original one by the relative positions of these marks. The registration parameters then are used to adjust the print-and-scan image back to the initial position and size. In the chapter 5, we will check that this method is effective to erase RST distortion and almost introduces no side effects to the watermarking system. Figure 3.1 The Print-and-scan Copy of 'Lena' with Supplemental Marks We use two commercial printers (HP Laser 4000 and HP Laser 4100) and one scanner (HP Scanjet 4570) to collect the experiment results for analysis. The images are printed and scanned at different resolutions (300dpi to 600dpi for printing, 75dpi to 1200dpi for scanning). Comparing the images from different printers, we find that besides the global RST distortion, the printers also introduce local affine distortion that is similar to the attacks of StirMark proposed in [11]. For instance, the HP Laser 4000 always 29 distorts the image under the same pattern, which extends and only extends the right up corner of the image horizontally. We believe that this noise comes from the mechanical defect of the paper roller or the toner drum. The unbalance of lamp illumination in scanners is also a type of local affine distortion, but this distortion is time-variant and varies during different scans. This noise distorts the large area with the same gray level in different ways, introducing the visual gray difference in the smooth area. Furthermore, when we impose the rotation and scaling operations on the image to get it back to the original position, the pixel values are inevitably interpolated. Since the interpolation noise is small compared to the print-and-scan noise, we model the interpolation as parts of the print-and-scan noise. To find common properties in print-and-scan process, different natural images are chosen for testing. These test images are illustrated in the appendix. However, we only illustrate the experiment results on the 512 × 512 'Lena'(Figure 3.2(a)) and 512 × 512 'Baboon'(Figure 3.2(b)), as they have very different properties for their image contents. From the histograms in Figure 3.2 (c) and (d), we can find that 'Lena' contains more low-intensity pixels while 'Baboon' contains more high-intensity pixels. Furthermore, there are many smooth regions and clear cut edges in 'Lena' while many texture areas in 'Baboon'. HVS is very sensitive to the local distortion within the smooth areas, thus embedding a watermark in 'Lena' without introducing visually perceived distortion is more difficult than in 'Baboon'. Experiments on these two images can help to find whether the pint-and-noise is sensitive to the intensity or texture of images. 30 (a) Original 'Lena' (b) Original 'Baboon' (a) Histogram of 'Lena' (b) Histogram of ''Baboon'' Figure 3.2 'Lena' and 'Baboon' In the following experiments, the images are considered as matrixes of pixel intensities. For example, within an image I, I ( x, y ) is the gray intensity at the location ( x, y ) , where x and y are indices of rows and columns respectively. Without loss of generality, we assume that ( x, y ) is scanned from left to right and top to bottom within the image. 31 3.2 Properties in Pixel Domain The properties of the print-and-scan in pixel domain are explored by the statistical analysis on the intensity value of every pixel within the test image. The distortion map is defined as the absolute difference of the original image and the print-and-scan image: Dx , y =| I x , y − Iˆx , y | (3.1) where I x , y represents the original image, Iˆx , y represents the print-and-scan image, and | ⋅ | is the absolute value function. The projection map is to project of the distorted image according to the gray levels within the original image: { ^ P( g ) = I x , y I x , y = g , for all x, y } (3.2) P( g ) contains all the pixels that have the same gray intensity g in the original image, and gets a set of their possible gray intensities in the distorted image. In the following experiments, when the projection map is plotted, the x-axis represents the gray levels g within the original image, and the y-axis represents the gray levels within the set of P( g ) . Distortion map records the distortions and the locations of these distortions, while the projection map only records the distortions for the same gray level and ignores the place where the distortions occur. The relation between projection map and distortion map is very similar to the relation between the histogram and its original image. Notice that if the projection map is calculated between the same images, its plot is a y = x line. 32 (a) project map of 'Lena' (b) project map of 'Baboon' Figure 3.3 Projection Map Between Original and Scanned Images Property I. The projection map of the print-and-scan image to the original image is a spindle-like mapping. In Figure 3.3(a) and Figure 3.3(b), the dispersed small grey dots plot the projection map between the print-and-scan image and the original image; and the dark dots along the line y = x are the projection map between the same images, say, I ( x, y ) and I ( x, y ) . For every single intensity value within the original image, there are many possible intensity values in the distorted image, and vice versa. The spindle-shape mapping also shows that the noise is related to the intensity of the original pixels. The low-intensity (near 50) pixels or high-intensity (near 200) pixels have a smaller number of possible values after print-and-scan; but the middle intensity (near 125) pixels have more possible intensity values. This shows that the middle-value intensity gets more noise from the print-and-scan attack. If all the grey and dark dots are projected to x-axis or y-axis, we can find that the dark dots are wider in range than the grey dots. This shows that there is a loss of bright pixels and dark pixels after the image is print-and-scanned, and the contrast within the image is degraded. As the gray intensity mapping between every original-distorted pixel pair is a many-to-many mapping, it is impossible to determine ever value of the original 33 gray intensity for every distorted pixel. In other words, a function exactly inverting the print-and-scan process does not exist. Property II. The print-and-scan distortion is content-dependent. Property I has shown that the noise at some location depends on both the original intensity of that location and those of the nearby locations. We seek for clearer relationship between the noise and the content in this experiment. Figure 3.4(a) and Figure 3.4(b) depict the distortion maps (equation (3.1) ) of 'Lena' and 'Baboon'. The darker pixel shows the larger distortion. Note that the distortions are small if they are compared to the original intensities ranging in 256 grays levels; therefore both distortion maps are scaled to grays level 64 to show more details on the distortion with low intensities. Besides the distortion related to the gray values discussed in the Property I, we may also find that the pixel distortion is closely related to the image content. The large distortion is more likely to occur in the texture areas of the original image; and a smaller distortion appears in the smoother areas. This phenomenon can be explained by the convolution function within the print-and-scan model introduced in chapter 2. The convolution function can be considered as a low-pass filter, thus it introduces less distortion to the smoother areas but more distortion to the areas with more textures. In addition, we examine these distortion maps carefully and find that some directional noise exists. We may see that there are some white bands of pixels near the noise of 'Baboon' and the hat of 'Lena'. That is, the distortion strength is almost the same along the horizontal direction but is different along the vertical direction. The different noise strength along the vertical direction should come from the dithering of the step motor to move the scan head from one side to the other side of the flatbed. 34 (a) distortion map of 'Lena' (b) distortion map of 'Baboon' Figure 3.4 Distortion Map Between Original and Scanned Images Property III. The print-and-scan noise is time-variant. The noise of different print-and-scan process varies, even though the same printer and scanner are used. Figure 3.5(a) show the projection map between two different print-and-scan copies of 'Lena', p1s1 ( Lena , t1 ) and p1s1 ( Lena , t2 ) , under the setting of the same printer and scanner. p1s1 ( Lena , t1 ) is the print-and-scan image of 'Lena' at time t1 ; p1 and s1 indicates that the used printer and scanner are printer 1 and scanner 1. Figure 3.5 (b) plots the projection map between p1s1 ( Lena , t1 ) and p2 s1 ( Lena , t2 ) . Both print-and-scan images are generated by different printers p1 , p2 and the same scanner s1 at time t1 and t2 . From both plots, we may find that the projection map (Figure 3.5 (a)) is unstable, though its distortion is less than those generated by different settings. The reason for this time variation should be the variation of mechanical dithering, tone roller temperature, and tone dissolution for different printings. Figure 3.6(a) shows that 'Lena' is noised by an independent Gaussian noise with zero mean and 0.001 variance, Figure 3.6(b) shows a distortion map between the Gaussian noised 'Lena' and the original 'Lena'. Comparing Figure 3.5(a) Figure 3.6(b), we can find that the projection map between 35 images under the same printer and scanner setting is very similar to that between a Gaussian independent noised image and its original version. In other words, the difference between the print-and-scan copies of image under the same printer and scanner setting is almost independent to the image content. (a) between images p-s by the same printer (b) between images p-s by different printers Figure 3.5 Projection Maps of Different Copies of Scanned 'Lena' (a) ‘Lena’ with Gaussian Noise (b) projection map of Lena with Gaussian noise Figure 3.6 Pixel Distortions Between Original Lena and Gaussian-Noised 'Lena' Property IV. The print-and-scan noise in nonlinear. From the above discussion and the distortion maps in Figure 3.3(a), (b), we can find that the function used to estimate the projection map of the print-and-scan image and the 36 original image must be a nonlinear function. As discussed in the preceding chapter, the spread functions of printers and scanner, the gamma correction, and the dot gain phenomenon introduces the nonlinearity to the image. The many-to-may spindle projection distortion can be considered as a nonlinear distortion plus other random noise. From the above properties in the pixel domain, we can find that it is impossible to completely erase the nonlinear, content-based and time variant print-and-scan noise if the distorted images are available only. The above experiments also show that the most robust feature space to print-and-scan is the pixels within the smooth areas. Therefore, a watermarking method referencing to the smooth areas probably is more robust to the print-and-scan process. Before design such a watermarking system, we should first find an evaluation function to determine whether some area is smooth or not. A simple method is to evaluate the energy of high frequency components in a frequency domain, because they represent the texture details within an image. In the next section, we define this evaluation function in the frequency domain and investigate the property of print-and-scan noise based on this function. 3.3 Properties in DCT Domain We choose the block-based DCT as the frequency domain to explore the properties of print-and-scan noise. In this domain, the block-partition preserves the spatial information about the image; while the coefficients within every block record the local frequency information only. The available spatial information within this frequency domain provides more flexibility for analyzing the image content. 37 It is well known that the high frequency coefficients in the smooth area have small values while those in the texture area have large values. Based on this observation, we define an energy function of DCT coefficients Fj to distinguish texture and smooth blocks: i2 E (i1 , i2 ) = ∑ Fj 2 1 ≤ i1 , i2 ≤ 64 (3.3) j = i1 where Fj is the DCT coefficient in an 8x8 block. The coefficient Fj is indexed by the zigzag scan order (Figure 3.7) mentioned in JPEG standard. The parameters i1 and i2 are used to decide the frequency band for calculating the energy. Figure 3.7 Zigzag Scan Order of DCT Coefficients In the following experiments, the low frequency energy and high frequency energy are defined as E (2,20) and E (21,64) respectively. The DCT coefficient of i = 1 , i.e. DC, is the most significant coefficient, whose magnitude is much larger than other coefficients. If this coefficient is counted into the low frequency energy, it will hide the energy of other coefficients. Therefore, the low frequency energy function starts from index 2. The energy 38 difference D between the print-and-scan image and the original image of a block is defined as: D(i, j ) = Escanned (i, j ) − Eoriginal (i, j ) (3.4) for 1 ≤ i, j ≤ 64 . Property V. After print-and-scan, the low frequency coefficients are preserved better than high frequency coefficients. This is an obvious property as the image content is not changed by the print-and-scan distortion. Figure 3.8 illustrates the absolute values of both the low and high frequency distortions for ‘Lena’ and ‘Baboon’. These 64 × 64 distortion maps illustrate the magnitudes of the energy distortions for all the blocks within the image. The distortions are scaled to 64 gray levels for better view, with the dark dots representing the large distortion magnitudes. Comparing the image pairs of ‘Lena’ and ‘Baboon’ in Figure 3.8, we can find that the low frequency distortions are mainly located on the strong textures such as clear-cut edges along Lena’s hat and Baboon’s face, while the high frequency distortions are uniformly distributed. From this Figure, we can also find that print-and-scan noise have all frequency components, i.e., it distributes to every frequency spectrum of the original image. The techniques to eliminate the noise for some frequency band are probably not useful. Notice that some horizontally distributed distortion near the hat of Lena in Figure 3.8(c) is apparently the dithering noise come from scanner. We have found this type of noise in property II, but it is more perceivable here in DCT domain. 39 (a) 'Lena': |D(2,20)|>0 (b)'Baboon': |D(2,20)|>0 (c) 'Lena': |D(21,64)|>0 (d)'Baboon': |D(21,64)|>0 Figure 3.8 Absolute Distortions in Low & High Frequency Property VI. After print-and-scan, most of the DC coefficients tend to change into larger values. Figure 3.9 illustrates all the DC distortions. The top pair in Figure 3.9(a) shows the blocks whose DC coefficients change to larger values and the bottom pair in Figure 3.9(b) shows those change to smaller values. Comparing these distortion maps, we can find that most DC coefficients change to larger values except the areas with high intensity. These areas are marked with dark dots in Figure 3.9(b). To investigate this property quantitatively, we plot the comparison of DCs between the original image and the print-and-scan image in Figure 3.9(c). The grey dots indicate the relations between the DCs of the original image and the distorted image, and the dark dots along y = x represent the expected relations 40 without distortions. Then the DCs changing to larger values are plotted above the line y = x , while the DCs changing to smaller values are plotted below this line. From this Figure, we can find that most DC coefficients changes to larger values after they are distorted; only those with large magnitudes change to smaller values. This property is consistent with the Property I, which indicates that the dark pixels tend to change brighter while the bright pixels tend to change darker. As the DC is the arithmetic mean of the gray values within a block, the result indicates that the image globally changes lighter after print-and-scan. This tendency mainly comes from the strong lights generated by the lamp in the scanners. (a) D(1,1)>0 (b) D(1,1) 0 , the texture blocks get more distortions; while if T < 0 , the smooth blocks get more. The experiment data for all the test images is listed in Table 3.1 and plotted in Figure 3.11. This data shows that the distortion of texture blocks is always more significant than that of smooth blocks for a variety of images. The results confirm the Property I again in the DCT domain. Images DT DS T ‘Lena’ -632.5 ‘Baboon’ -7678.7 ‘Girl’ -2927.1 ‘Fruit’ -2774.4 ‘Flower’ -5654.3 ‘Women’ -8731.5 580.7 674.4 403.1 351.4 835.4 365.2 265.1 8821.4 2962.5 3734.7 8276.2 11143.8 Table 3.1 Means of Different High Frequency Distortions 43 Figure 3.11 Magnitudes of Different Types of Distortions This is a very important property for guiding us to design the watermarking scheme, as we find the robust feature space within the images that is comparably stable. The watermark embedded in the smooth blocks will probably robust to print-and-scan distortion. 3.4 Summary Because the print-and-scan model can not be used directly in our watermarking system, we discuss the properties of print-and-scan noise by experiments in this chapter. This property is explored in both the pixel domain and the frequency domain. The results show that no models are able to erase the print-and-scan noise completely if no additional information like the original image, the original watermark or the calibration parameters for the used printers and scanners is available. The results also show that the smooth blocks get far less 44 distortion during the print-and-scan process. This important property implies that the smooth areas compose a robust feature space in different images. Watermarking in this feature space may probably be more robust to print-and-scan distortion. However, HVS is sensitive to even small distortion in smooth areas. Thus the watermark can not be embedded by directly introducing modification to the smooth blocks. In the next chapter, we will discuss how to embed the watermark into this feature space indirectly, by applying the smooth blocks as a reference rather than directly modifying them. 45 Chapter 4 Watermarking Algorithm In chapter 2 and chapter3, we have discussed the working principles, the mathematical models and the distortion properties of printers and scanners, from both theoretical and experimental aspects. We found that perfectly erasing the print-and-scan distortion impractical, if neither the original image nor the watermark is known to watermark detector. Using the present image processing techniques, the watermarking system can only estimate this random distortion. However, the estimation process itself also introduces noise to the images because the applied models are not perfect. Therefore, we are not concerned with modeling the complex function of print-and-scan distortion. We embed the watermark into the feature space of the image that is robust to print-and-scan. Previous experimental investigations have shown that the smooth blocks compose this feature space. As we all know, the DCT quantization would erase the high frequency coefficients within the blocks and make them smooth. Thus DCT quantization would help us to create this robust feature space. In this chapter, we discuss how to design our watermarking system, by taking all the experimental results into consideration. 46 As we have mentioned before, HVS is sensitive to even the slight distortion in the smooth areas; while watermarking directly in this feature space will inevitably introduce distortion to the smooth blocks. For this reason, watermarking in the smooth blocks should be done indirectly. We choose to optimize the Differential Energy Watermarking (DEW) [30], because it meets our basic requirements by embedding watermark without distorting the smooth blocks but by referring to them indirectly. DEW embeds watermark by deleting high frequency coefficients in the quantized DCT domain, provides the robustness by distributing the watermark bits to different locations, and keeps the image content with little distortion by adaptive embedding. We incorporate the preprocessing techniques to improve the robustness of watermark in the feature space and use double votes to provide more robust watermark extraction scheme. In the following sections, we introduce the original DEW first, then discuss our methods on how to optimize this system based on the properties of print-and-scan distortion. 4.1 Original DEW Differential Energy Watermarking (DEW) was first proposed by Langelaar et al in [30]. The main idea of this scheme is to selectively discard high frequency DCT coefficients for watermark embedding. The pattern about how to delete the coefficients is decided by the watermark bit value. This watermarking scheme provides flexibility to balance the robustness and fidelity by many control parameters. In this section, we roughly introduce the embedding scheme and the extracting scheme of this watermarking system. 47 4.1.1 Watermark Embedding Figure 4.1 depicts the general procedure of the embedding scheme: take block-based DCT for the image, shuffle all the DCT blocks, embed one watermark bit to a GOB, and finally de-shuffle the DCT blocks and take the IDCT transform. Here, a GOB is defined as a number of blocks that are clustered together as a square. For instance, white grids in Figure 4.2 illustrate boundaries of the GOBs of 16 blocks. Figure 4.1 DEW Watermark Embedding Scheme The calculation of the block-based DCT and IDCT is addressed in details in the JPEG standard. The image is divided into bocks of 8 × 8 size, and the 2-dimension discrete cosine transform (DCT) is calculated for every block. To reconstruct the image from the DCT coefficients, an inverse discrete cosine transform (IDCT) is performed block-wise. Figure 4.2 Shuffled Images: 'Lena'(LEFT) & 'Baboon'(RIGHT) 48 Shuffle operation re-arranges all the DCT blocks randomly to spatially randomize the modifications to the DCT blocks and hide the watermark locations. The watermark key K is a symmetric key and the watermark extractor also needs the key to extract the embedded watermark. In fact, K is the seed to initialize the pseudo-random number generator within the shuffle operation module. Figure 4.2 shows the randomly shuffled blocks of 'Lena' and 'Baboon', with the white grids to indicate the boundary of the GOBs containing 4 × 4 blocks. Figure 4.3 Creation of GOB in DEW How to embed a single bit into a GOB is the core of DEW. The basic idea is to selectively delete the high frequency coefficients of the upper half or the lower half of GOB. Which half of GOB's coefficients should be deleted depends on the embedded watermark bit. And how many coefficients are deleted is determined by the expected image quality. As illustrated in Figure 4.3, a GOB is divided horizontally into two sub-groups A and B by and the energy functions of these two halves are calculated as: n/2 E A (c, n, Q jpeg ) = ∑ Ek (c, Q jpeg ) k =1 (4.1) 49 EB (c, n, Q jpeg ) = n ∑ k =n 2+1 Ek (c, Q jpeg ) (4.2) where Ek (c, Q jpeg ) is the high frequency energy function of the kth block within the GOB, n is the total number of blocks within a GOB, c is the cutting index for the calculation of the high frequency energy, and Q jpeg is the quality factor in JPEG standard. The Ek (c, Q jpeg ) in the equation (4.2) is defined as: 64 Ek (c, Q jpeg ) = ∑ ([ Fk (i )]Q )2 i =c (4.3) jpeg In equation (4.3), Fk (i ) is the ith DCT coefficient within kth block and [ ⋅ ]Q jpeg is the JPEG quantization with the quality factor Q jpeg . Based on the above definitions, the energy difference D of every GOB between the upper sub-group and the lower sub-group is defined as: D = E A − EB (4.4) The watermark embedding adapts E A and E B to modify the energy difference D, which is used to indicate the watermark bit embedded in this GOB. In particular, when watermark bit "0" is embedded, all the high frequency coefficients after the index c in the DCT-blocks of lower sub-group B are eliminated, resulting in: D = E A − EB = E A − 0 > 0 (4.5) Similarly, when a watermark bit "1" is embedded; the high frequency coefficients of upper sub-group A are erased, resulting in D = 0 − EB < 0 . Thus the watermark bit can be extracted as "0" if D > 0 , and "1" if D < 0 50 In equations (4.1) and(4.2), c is the cutting index for high frequency coefficients, which determines how many coefficients are deleted during watermark embedding. To protect the image visual quality from great distortion, this cutting index must be greater than a predefined threshold index cmin so that the important low frequency coefficients are never erased. In other words, those coefficients with indices c < cmin are never deleted. This requirement indirectly sets an upper bound for the absolute energy difference | D | if the number of blocks within a GOB, i.e. n , is fixed. Nevertheless, | D | should be large enough to tolerate errors to watermark extraction and enhance the system robustness. Therefore, DEW requires both E A and EB is larger than a predefined energy threshold E . Because | D | equals to E A or EB after watermarking, this requirement sets the bottom bound for | D | indirectly. All these requirements are combined to determine the optimal cutting index c : c( n, Q jpeg , E , cmin ) = max{ cmin , max{i ∈ {0,63} | E A (i, n, Q jpeg ) > E ∩ E B (i, n, Q jpeg ) > E}} (4.6) In other words, the optimal c is the largest index such that both E A and E B is larger than the designed energy threshold E under the constraint cmin . From equation(4.6), we can see the relation between c and other parameters: c is a decrease, increase and decrease function for Q jpeg , n and E respectively, c will be decreased. Note that even though an energy threshold E is imposed, | D | could be always smaller than E in some special cases because | D | also depends on the image content. Under the constraint cmin , the maximum energy function of a specific sub-group is E ( cmin , n, Q ) . This maximum value jpeg is still possible to be smaller than E as long as most blocks within this sub-group are smooth blocks. In these special cases, the extracted watermark is possibly wrong even 51 there are no attacks on it. The energy threshold E enables the adaptive discarding of DCT coefficients for different blocks. The index c is larger for a sub-group containing texture blocks than that containing smooth blocks. This soft threshold guarantees the robustness of the watermarking and deletes the DCT coefficients as less as possible for keeping the visual quality of the watermarked images. 4.1.2 Watermark Extracting Figure 4.4 illustrates the general procedure of DEW extracting scheme. The watermark key K used during watermark embedding is needed here. Only those who know K can reverse the shuffle sequence for the DCT blocks and extract the correct watermark. This mechanism prevents the information leakage of the watermark, which is valuable in some scenarios where the watermark also needs to be protected. Figure 4.4 DEW Watermark Extracting Scheme Because the cutting indices c for different blocks are adaptively selected in the watermarking scheme, the watermark extractor has no information about their real values. DEW uses an indirect method to find the embedded pattern of energy difference between both sub-groups. The idea is to compare the smallest indices c A and cB for sub-group A and B that enable the energy functions larger than a small energy threshold G . More formally, c A and cB are calculated for both sub-groups as: 52 c A = min{c | E A (c, n, Q jpeg ) < G} (4.7) cB = min{c | EB (c, n, Q jpeg ) < G} (4.8) where G is the predefined small energy threshold. The energy threshold G for extracting is set as a value far smaller than the energy threshold E for embedding. Comparing the results of equation (4.7) and (4.8), we can find the embedded patter of energy difference. If ( cB < c A ) , the lower sub-group B needs more frequency coefficients to reach the threshold G. In this case, B is probably the sub-group whose high frequency coefficients are eliminated for watermark embedding. Similarly, A is the modified sub-group if (c A < cB ) . In case of c A = cB , the watermark bit cannot be determined solely by a comparison between both indexes, thus a comparison between the energy functions EB (cB ) and E A ( c A ) is needed. However, it is still possible that cB = c A and EB (cB ) = E A ( c A ) . In this case, either '0' or '1' is possible; thus DEW chooses '1' as the extracted bit. In summary, the extracted watermark bit from this GOB is determined by: { Wi = 0, 1, if ( cB < c A ) or ( cB = c A and E B ( cB ) < E A ( c A )) otherwise (4.9) 4.2 Our Watermarking Scheme As we have discussed in chapter 3, the smooth blocks in the image get less print-and-scan distortion than the texture blocks. However, embedding watermark directly in this feature space is impossible because even the slight distortion to the smooth blocks can be perceived by HVS. DEW embeds watermark by selectively smoothing some blocks, which actually enlarges the robust feature space for print-and-scan process. However, the 53 discussion of the original DEW in the previous section shows that the constraints of cmin will decrease the system robustness even though the energy threshold E is also imposed to the watermarking system. In addition, DEW utilizes different patterns of energy difference to encode the watermark bits, so the distortion to the texture blocks also affects the correctness of the extracted watermark. For a blind watermarking scheme, the only information available for watermark extraction is the watermarked image itself. Therefore, the embedded watermark bit ‘1’ and ‘0’ must be mapped to different patterns within the image. The smooth blocks can only create one pattern so it is inevitable to take the texture blocks into account. We need to find a method to decrease the print-and-scan distortion to the texture blocks for better robustness. Furthermore, the DEW extracts the watermark bits by a simple comparison between the cutting indices of two sub-groups. The watermark bit extracted by this method is not always correct even there is no noise distorting the watermarked image [31]. The existence of error is because of the constraint cmin used in watermark embedding. As we know, all the blocks in the image are shuffled randomly, so the energy functions of the two sub-groups would be fairly close to each other before watermarking. If the original image I contains many smooth areas, it is possible that the high frequency energy above the cutting index cmin for some sub-group is still smaller than E, e.g., E (cmin,Q jpeg ) < E . In that case, even all the DCT coefficients larger than cmin in the other sub-group are deleted, the energy difference between these two sub-groups is not sufficiently large. Without the loss of generality, suppose the high frequency coefficients of sub-group B are deleted during 54 watermark embedding and E A (cmin,Q jpeg ) < E . Then after watermark embedding, the energy difference between the two sub-groups is: D = E A ( cmin , Q jpeg ) − EB ( cmin , Q jpeg ) = E A ( cmin , Q jpeg ) < E (4.10) E A ( cmin , Q jpeg ) then has no bottom bound as expected, and E A ( cmin , Q jpeg ) < G is possible. In this case, the equation (4.9) for watermark extraction can not guarantee c A > cB and thus the extracted watermark is probably wrong. Langelaar et al gives the theoretical analysis on calculating this type of error probability in [31]. When the print-and-scan distortion exists, this simple watermark extraction method is more fragile. Following the above example of deleting high frequency coefficients of sub-group B to embed the watermark bit "0", D = E A − EB = E A − 0 > 0 is expected after watermarking. The discussion in the chapter 3 shows that print-and-scan distortion increases the energy of smooth blocks while decreases that of texture blocks. Given the energy decrease of sub-group A is ∆ A ( ∆ A > 0 ) and the energy increase of sub-group B is ∆ B ( ∆ B > 0 ) , the energy function for the two sub-groups then changes to E A ' = E A − ∆ A and EB ' = EB + ∆ B . Then, the energy difference will change to: D ' = E A '− EB ' = ( E A − EB ) − ( ∆ A + ∆ B ) < D (4.11) If the distortion is large enough, the distortion D ' < 0 is possible, and the extracted watermark is wrong. To abandon the use of cmin in the watermark embedding is a solution to this problem, but the shortage of protection on the image quality is risky. Solving these problems needs a more robust watermark extracting method. 55 DEW requires that every group contains an even square number of blocks. This strategy lacks the flexible control on the watermark capacity, as the gap between square numbers is large. In fact, the number of blocks in a group is only need to be an even integer so that it can be divided by two sub-groups. In DEW, many even numbers within every gap of square numbers can never be used as the group size. This parameter also affects the robustness of the watermarking system indirectly. When a larger number is chosen as the group size, the watermark is more robust as every watermark bit will be distributed to more locations. More flexible choices on this value provide more levels of robustness to the watermarking system and more possible tradeoffs between the robustness and the capacity. In following sections, we show how to modify the original DEW for better robustness to print-and-scan distortion. 4.2.1 Watermark Embedding The original DEW proposes a method to create the smooth blocks, which get less distorted by the print-and-scan process. However, we still need to protect the texture blocks because the correct watermark extraction also depends on these blocks. As it is impractical to erase the print-and-scan distortion, we protect the texture blocks by compensating the expected distortion. Besides deleting DCT coefficients from one sub-group, our method adds DCT coefficients in the other sub-group to increase the magnitude of energy difference. The print-and-scan distortion has been classified into two parts in (4.11): ∆ A is the distortion to the texture blocks and ∆ B is the distortion to the smooth blocks. To compensate ∆ B , we can erase more coefficients than we need. Similarly, we can also add coefficients into the 56 texture blocks to compensate ∆ A . If the added noise to the image is controlled carefully, the image quality may be reserved without great changes. Furthermore, we provide more choices on the number of blocks within a group, by exploiting a slice structure rather than the original square structure to the group of blocks. A slice structure is formed by a row of 2n blocks, and it can be divided into two sub-slices from the middle. Choosing the slice structure enables a flexible tradeoff between the robustness and the capacity of a watermarking system. The general procedure of our watermarking scheme is similar to the original DEW in Figure 4.1 of section 4.1.1. The only difference is the operation within the embedding block. Referring to Figure 4.1, the input to this block includes the shuffled DCT blocks and the watermark bit stream, and the output is the watermarked blocks. Figure 4.5 illustrates the details of our new operations within this block. Figure 4.5 Modified Watermark Embedding Scheme A slice of blocks is defined as a row vector of 2n blocks, which can be divided into two n-size sub-slices. To create a slice, we scan the image in a raster order, collect 2n blocks and arrange them into a row vector. Formally, the kth slice of an image I is defined as: 57 S k ( I ) = {block j (k −1) ⋅ M + 1 ≤ j ≤ k ⋅ M −1 and j ≤N } (4.12) where block j is the jth block ordered in a raster scan within the I , N is the number of blocks in image I and M = 2n is the number of blocks in a slice. In Figure 4.6, the white grids mark all the slices containing 12 blocks in the shuffled ‘Lena’ and ‘Baboon’. When the roster scan fails to get enough blocks in this scan line to create the slice, the blocks in the next scan line will be selected. Therefore a slice may contain blocks from different scan lines of the image. The creation of slice continues, until there are no enough blocks in the last scan line for a slice. Figure 4.6 Slices of the Shuffled Images: 'Lena' (LEFT) & 'Baboon' (RIGHT) After the image is sliced, it is divided in the left sub-slice A and the right sub-slice B from the middle for differential energy watermarking. The watermark embedding is defined as: addDCT ( A), B ' = eraseDCT ( B ), if w = 1 { AA '' == eraseDCT ( A), B ' = addDCT ( B ), if w = 0 (4.13) where functions addDCT (⋅) and eraseDCT (⋅) intend to add or delete the high frequency DCT coefficients of the sub-slice to encode the watermark bit w . The 58 function eraseDCT (⋅) is the same as what the original DEW does in watermark embedding, i.e., deleting all the coefficients above the optimal cutting index c . In addDCT (⋅) , we add high frequency coefficients in the other sub-slice. But if we directly add the coefficients in DCT domain, we have no idea about the visual effect of the noise to the pixel domain. For this reason, we add the high frequency DCT coefficients indirectly by the white Gaussian noise in the pixel domain. By this means, we know the visual effect of noise in pixel domain while increase the energy of this sub-slice. Figure 4.7 PSNR of Different Print-and-Scan Images The strength of this noise must be large enough to compensate the print-and-scan distortion; but it must also be small enough to protect the image content from distortion. To achieve a good tradeoff between watermark robustness and image quality, we need to 59 know the strength of the print-and-scan distortion. The PSNR values for different print-and-scan images are calculated and illustrated in Figure 4.7. From this figure, we find that the print-and-scan distortion is so great that the PSNR for different original images drop to smaller than 30. Then if the PSNR of the noisy image is larger than 40, the image quality is still better than the print-and-scan image. Based on this observation, we add noise into the image such that its PSNR is larger to 40 before watermarking. Figure 4.8 shows the print-and-scan copy of the original "Lena" and that of the noisy "Lena". We can hardly perceive their difference, even in the smooth areas such Lena’s shoulder. The other images contain more texture blocks than "Lena" and hide the noise distortion more easily, thus they are not illustrated here for comparison. Figure 4.8 Print-and-Scan Copies of 'Lena': Original(LEFT); Noise Adding(RIGHT) In addDCT (⋅) , we use the binary search to find the appropriate variance for the Gaussian noise, calculate its DCT coefficients, and add its high frequency coefficients to the DCT domain of original image. To protect the low frequency coefficients of the image, only the 60 coefficients with indices larger than cmin within the Gaussian noise are used for calculation. The details of addDCT (⋅) is described below: Iˆ = addDCT ( I , psnrThreshold , cmin ) Step 1. mean=0; var=1; varMin=0; varMax =1; while( psnr ( Iˆ , I ) - psnrThreshold > 0.01 ){ var = 0.5(varMin + varMax); Iˆ = I + GaussianNoise ( m, v ) ; If ( psnr ( Iˆ, I ) > psnrThreshold ) varMin = var; else varMax = var; } Step 2. NoiseDCT [...]... vector to a specific space In this thesis, I would like to model watermarking as a multiplexed communication 9 1.2 Print- and- Scan Process As we are concerned with the digital watermarking robust to print- and- scan process, we need to know what the print- and- scan process is, and the property of the noise it adds to the image The whole print- and- scan process is: printing the image of digital format onto... image watermarking robustness to print- and- scan process In some cases, the print- and- scan is also thought as the acceptable image processing techniques as it does not change the image content greatly This thesis tries to understand the print- and- scan process and aims to design a watermarking scheme robust to the distortion comes from this process This chapter begins with an overview of digital watermarking, ... theories in optics and electronics to avoid these mechanical strikes[22] Dot-matrix printers, daisy-wheel printers, and line printers belong to the impact printers, which are noisier than the non-impact printers like inkjet printers and laser printers On the other hand, printers can be classified as contone printers and halftone printers [19] Contone printers can print the continuous tone images directly,... distortion The results include the robustness performance of our watermarking system for different images, and the comparison on the robustness between the original DEW and our system 14 Chapter 2 Printer and Scanner To design a watermarking scheme robust to print- and- scan process, we need to know the working principles and the mathematical models of printers and scanners In this chapter, we first... eyes can recognize an original copy and a print- and- scan copy of the same image to be similar, it is intuitive that some feature space within an image can be robust to print- and- scan In other words, in the print- and- scan context, feature space should be found in a coarse granularity 1.3 Motivation There are many applications for watermarking robust to print- and- scan process The authentication of documents... on Watermarking Due to the variations in the print- and- scan process, the research in literature only partially solve the problems related to the watermarking that is robust to print- and- scan process As previous research on the rotation, scaling and transformation (RST) has been introduced in chapter 1 In this section, we will review the related work exploring the pixel value distortion of print- and- scan. .. watermarking robust to it Lin gave a general model for the pixel value distortion of print- and- scan process in [17] Although the detailed formulas of this model are not given, all types of noise involved in the print- and- scan process have been taken into consideration Nevertheless, this model needs the calibration for different setting of printer and scanner Thus it is not common for all the 11 printers and scanners... format onto a paper, and scanning this paper to get back the digital image Intuitively, this process is a kind of D/A A/D transformation, and the noise of this process comes mainly from the transformation between digital format and analogue format Nevertheless, because many uncontrolled and unexpected distortion is introduced in the print- and- scan process, the model of print- and- scan noise is more complex... based on the printer and scanner models The results of the chapter 2 and chapter 3 give the basis to design a robust watermarking system Chapter 4 discusses our watermarking system This watermarking system is a variation of the Differential Energy Watermarking (DEW) Chapter 5 presents the experiment results to 13 evaluate the robustness of our watermarking system to print- and- scan distortion The results... an overview of digital watermarking, and then introduces the mathematical models of watermarking After that, the related research on digital watermarking robust to print- and- scan process is introduced Finally the organization of the whole thesis is given 2 1.1 Digital Watermarking 1.1.1 Overview of Digital Watermarking The history of watermarking can be traced back to several hundred years ago, when ... the digital watermarking robust to print-and-scan process, we need to know what the print-and-scan process is, and the property of the noise it adds to the image The whole print-and-scan process. .. tries to understand the print-and-scan process and aims to design a watermarking scheme robust to the distortion comes from this process This chapter begins with an overview of digital watermarking, ... techniques similar to Cox's scheme are proposed in [28, 29] To develop a watermarking system robust to print-and-scan process, Lin models the pixel distortion in print-and-scan process in [17]:

Ngày đăng: 04/10/2015, 16:02

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN