Transcript Document
SECURE REVERSIBLE VISIBLE IMAGE WATERMARKING WITH AUTHENTICATION Source
: Signal Processing: Image Communication 25(2010) pp.10-17
Authors
: Han-Min Tsai, Long-Wen Chang
Presenter
: Huynh Ngoc Tu
Date
: June 9 th , 2010 1
OUTLINE
• INTRODUCTION • PROPOSED SCHEME • EXPERIMENTAL RESULTS • CONCLUSIONS
INTRODUCTION
There are two kinds of reversible watermarking: -Lossless invisible watermarking -Lossless visible watermarking Three major requirements for visible watermarked images: -Visibility -Transparency -Robustness
THE PROPOSED SCHEME (1/6) Visible watermarking Protection and Transparency adjustment Reversible data embedding
THE PROPOSED SCHEME (2/6) Alpha component value defining its opacity: α=0: completely transparent α=1: totally opaque 5
THE PROPOSED SCHEME (3/6) VISIBLE WATERMARKING W: watermark image R: region of host image R w : watermarked image m : mean value of pixel values Host image Watermark image 6
THE PROPOSED SCHEME (4/6) 14 26 23 25 12 13 21 15 17 30 32 10 50 16 18 Host image 20
1 0 0 1
Watermark image 14 26 23 25 12 17 15 10 50 16 18 20 Watermarked image 7
THE PROPOSED SCHEME (5/6) 14 26 23 25 12 13 111 15 17 116 32 10 50 16 18 20
D
corresponding to
W
(
x,y
) = 1 is equal 0
D
corresponding to
W
(
x,y
) = 0 is equal 1:
LSB
of
R
8
THE PROPOSED SCHEME (6/6) Protection and transparency adjustment of the watermarked region
S
= {s 1 , s 2 ,…, s
n
}: random sequence
X
1
: subsequence of n
1
intergers X n
1 2
: subsequence of n = 3n
2 2
intergers n = n
1
+ n
2
, S
=
X
1 +
X
2
n
: number of black pixels in
W p i
: pixel in
R w
in
W
corresponding to black pixel Distortion: 9
EXPERIMENTAL RESULTS(1/5)
Watermark image Watermarked image 10
EXPERIMENTAL RESULTS(2/5)
The watermarked images produced by the proposed method with (a) F-16 (b) Lena (c) Baboon. 11
EXPERIMENTAL RESULTS(3/5)
(a)-(c): zoom-in watermarked images “Lena” with different sequences (d)-(f): recovered images from images (a)-(c) 12
EXPERIMENTAL RESULTS(4/5)
Visual effects on the cropped watermarked images‘‘Lena’’,‘‘F-16’’,and‘‘Baboon.’’ (a)–(c)Yongjian and Byeungwoo method [5]. (d)–(f)The proposed method 13
EXPERIMENTAL RESULTS(5/5)
Comparison among scheme [5], scheme [7] and proposed scheme [5] H. Yongjian, J. Byeungwoo, Reversible visible watermarking and lossless recovery of original images, IEEE Transactions on Circuits and Systems for Video Technology 16 (2006) 1423–1429.
[7] Y. Shu-Kei, O.C. Au, H. Chi-Wang, W. Hoi-Ming, Lossless visible watermarking, IEEE International Conference on Multimedia and Expo (2006) 853–856. 14
CONCLUSIONS
Features: • Lossless image recovery • Unlimited watermark size • Authenticating ability Demerit: require side information 15