DCT based Watermarking technique

5
DCT Based watermarking recovering without restoring to the uncorrupted Original Image Umair Amjad [email protected]

description

DCT-based Watermark Recovering without Resorting to the Uncorrupted Original Image

Transcript of DCT based Watermarking technique

Page 1: DCT based Watermarking technique

DCT Based watermarking recovering without restoring to the uncorrupted Original Image

Umair Amjad [email protected]

Page 2: DCT based Watermarking technique

AgendaWatermark embeddingWatermark detection

DCT-basedWatermark Recoveringwithout Resorting to the Uncorrupted Original Image

A. Piva, M. Barni, F. Bartolini, V. CappelliniDipartimento di Ingegneria Elettronica

Universit`a di Firenzevia S. Marta 3, 50139, Firenze, Italy

e-mail [email protected]

Page 3: DCT based Watermarking technique

Watermark EmbeddingRead image. Lets say, I.DCT transform is applied.DCT coefficients are reordered into a zigzag scan.It is now impossible for the decoder to determine the position of the coefficients with the largest magnitude, since non-marked image is no longer available.

T = {t1, t2, . . . . . . , tL, tL+1, . . . . . . , tL+M}To get perceptual invisibility we skipped first L coefficients.Now, watermark X = {x1, x2, . . . . . . , xM} (choose among pseudo-random sequences) is embedded in the last M numbers, to obtain a new vector.T’ = {t1, t2, . . . . . . , tL, t’L+1, . . . . . . , t’L+M}

According to the rule:t’L+i = tL+i + α |tL+i| xi

Where i = 1, . . . . . , M

Now the vector T’ is inserted in the inverse zigzag scan and the inverse DCT algorithm is performed, obtaining the watermarked image I’.

Page 4: DCT based Watermarking technique

Watermark DetectionRead watermarked image. Lets say I*.DCT transform is applied.Perform zigzag scan.Now coefficient (L+1)th to (L+M)th are selected to generate a vector.T* = {t*L+1, t*L+2,. . . . . . , t*L+M}

The correlation between the corrupted coefficients T*, and the mark itself is taken as a measure of the mark presence.

For this we generate 1000 random fake watermarks.Correlation is computed for each of the marks and that with the largest correlation is assumed to be the one really present in the image.

Page 5: DCT based Watermarking technique

Original Image Waterwark Image