Improving The Robustness of DCT-based Image Watermarking Against
Improving The Robustness of DCT-based Image Watermarking Against
a r t i c l e i n f o a b s t r a c t
Article history: A DCT-based image watermarking technique is proposed in this article. To improve the robustness of
Received 1 February 2007 watermark against JPEG compression, the most recently proposed techniques embed watermark into the
Received in revised form 4 April 2009 low-frequency components of the image. However, these components hold significant information of the
Accepted 23 June 2009
image. Directly replacing the low-frequency components with watermark may introduce undesirable
Available online 3 July 2009
degradation to image quality. To preserve acceptable visual quality for watermarked images, we propose a
watermarking technique that adjusts the DCT low-frequency coefficients by the concept of mathematical
Keywords:
Image watermarking
remainder. Simulation results demonstrate that the embedded watermarks can be almost fully extracted
JPEG compression from the JPEG-compressed images with very high compression ratios.
Robustness © 2009 Elsevier B.V. All rights reserved.
Torus automorphism
0920-5489/$ – see front matter © 2009 Elsevier B.V. All rights reserved.
doi:10.1016/j.csi.2009.06.004
S.D. Lin et al. / Computer Standards & Interfaces 32 (2010) 54–60 55
watermark. The other is robustness, namely the watermark should be applying the YUV color transformation, as shown in Eq. (2), on the
able to resist attacks, even if these attacks are deliberately made [7]. To original RGB image. The two reasons for embedding watermark in Y
improve the robustness of watermark, most of the recently proposed (luminance) rather than U or V (chrominance) are: (i) human visual
techniques embed watermark information into the low-frequency system is more sensitive to luminance than to the other two
part of images [8–10]. Huang et al. proposed a novel DCT-based chrominance components, and (ii) the JPEG and MPEG standards
technique which embeds watermarks in the DC components of images typically use higher density for Y than for the other two components.
[8]. The main idea behind this technique is that more robustness can 0 1 0 1 0 1
be achieved if watermarks are embedded in DC components since DC Y 0:299 0:587 0:114 R
@ U A = @ −0:148 −0:289 0:437 A × @ G A ð2Þ
components have much larger perceptual capacity than ac compo-
nents. In addition, the authors took advantages of the feature of spatial V 0:615 −0:515 −0:100 B
masking (both luminance and texture masking) of the HVS to
adaptively embed watermarks into images. For digitized images to Step 3. DCT transformation and quantization: Discrete Cosine
be safely and efficiently transmitted on the Internet, watermarked Transform (DCT) is a kind of signal decomposition that converts
images should be particularly robust to JPEG compression. Recently, images from spatial domain to frequency domain. The equation of
Lin et al. proposed two kinds of DCT-based image watermarking forward DCT regarding an image block of size N × N pixels is given
techniques [9,10]. These schemes perform well under general JPEG in Eq. (3). Note that DCT(i, j) represents the coefficient at coordinate
compression. However, when the watermarked images have to be (i, j) in the DCT-transformed block and pixel(x, y) is the pixel value at
compressed with higher compression ratio, the embedded water- coordinate (x, y) in the original block.
marks may be destroyed seriously. To overcome this problem, an
NX
− 1 NX
−1
improved technique has been studied and proposed in this paper.
DCTði; jÞ = C ðiÞ × C ð jÞ × pixelðx; yÞ ð3Þ
The rest of this paper is organized as follows. The proposed DCT- x=0 y=0
based watermark embedding and extracting algorithms are described
in Sections 2 and 3, respectively. The relative parameters for the ð2x + 1Þiπ ð 2y + 1Þjπ
× cos cos
proposed watermarking scheme are provided in Section 4. Section 5 2N 2N
addresses our experimental results and discussion, especially on JPEG
compression with very high compression ratios. Finally, the conclu- where
sions are given in Section 6. 8 rffiffiffiffi
>
> 1
>
< N for i; j = 0
2. Watermark embedding algorithm C ðiÞ; C ð jÞ = rffiffiffiffi
>
>
: 2
> for i; j = 1; 2; N ; N − 1
The detailed steps of the proposed watermark embedding N
algorithm are given as follows.
Step 1. Torus automorphism permutation: in order to increase the After color transformation, the luminance Y of image is divided
security and robustness of watermark, the watermark pattern should into non-overlapping blocks of size 8 × 8, and each block of Y is DCT
be disarranged before embedding. Torus automorphism (TA) is an transformed independently. In order to enhance the robustness of
effective method to disperse a watermark equally and randomly [11]. watermark against JPEG compression, each DCT-transformed block of
Applying the concept of TA for scrambling the binary watermark Y is quantized based on the quantization table provided by the JPEG
before it is embedded into the host image offers cryptographic compression standard as shown in Fig. 1.
protection against intentional reconstruction of watermark [12]. This Step 4. Embedded blocks selection: to improve the invisibility of
is because the key utilized in the TA permutation procedure (for watermark, the complex blocks of images are selected for watermark
scrambling the watermark) is also necessary in the inverse TA embedding. In the DCT domain, the number of non-zero coefficients in
permutation procedure (for reconstructing the watermark). The key each block is computed to estimate the complexity of the image block.
is held only by the distributor of the watermarked image. Without the Let N(n) represent the number of non-zero coefficients in block n. The
key, the attacker cannot determine the original permutation of image blocks can be sorted into descending order based on their
watermark bits. Consequently, it is difficult for the attacker to detect corresponding N(n)s.
and reconstruct the watermark pattern. The details of the Torus Step 5. Watermark insertion: in the proposed scheme, the binary
automorphism permutation can be found in [13]. information of watermark pattern W is sequentially embedded into
The watermark used in the proposed scheme is permuted based on the selected image blocks obtained in step 4. Two bits of watermark
the following equation before it is embedded into the host image. pattern are embedded into the low-frequency components of each
selected block for preserving the visual quality of watermarked
i⁎ 1 1 i
= × mod m ð1Þ
j⁎ k k+1 j
Eq. (1) means that each pixel of the watermark pattern at co-
ordinate (i, j) is moved to (i⁎, j⁎), and k and m are the key parameters
given by the user. Let Wp be the permuted watermark after Torus
automorphism permutation, then divide Wp into non-overlapping
pairs.
Step 2. YUV color transformation: RGB color space is highly
correlated and is not suitable for watermarking applications, except
for the blue channel utilized by some researchers. However, the
potential of the RGB channels can be exploited for watermarking, by
decreasing the correlation among them. In the proposed scheme, we
adopt the YUV color space for watermark embedding. The watermark
information is embedded into the luminance components of images.
The luminance information Y of the color image is obtained by Fig. 1. The quantization table recommended in the JPEG specification.
56 S.D. Lin et al. / Computer Standards & Interfaces 32 (2010) 54–60
Note that Clow and Chigh are the two candidate values adaptively
generated for replacing C. Based on the above rule, C⁎ can be easily Table 1
computed and the difference between C⁎ and C is very small. In the NC values under JPEG compression with different compression ratios (CR: compression
ratio; PSNR: in the unit of dB).
M CR 0 10 20 30 40 43 47 53
14 PSNR 36.4 35.0 34.4 32.3 31.0 30.4 29.9 29.3
NC 1 1 0.97 0.96 0.32 0.44 0.46 0.44
18 PSNR 36.0 34.7 34.1 32.2 30.7 30.4 29.8 29.1
NC 1 1 1 0.94 0.95 0.72 0.37 0.43
26 PSNR 34.4 33.5 33.0 31.4 30.5 30.1 29.4 28.7
NC 0.97 0.97 0.97 0.97 0.93 0.96 0.97 0.97
Table 2
NC values under uniform noise attacks (NR: noise ratio in %).
M NR 0 5 10 15 20 25 30
14 PSNR 36.4 29.8 24.6 21.2 18.7 16.9 15.4
NC 1 0.99 0.72 0.48 0.31 0.23 0.12
18 PSNR 36.0 29.6 24.5 21.1 18.7 16.9 15.4
NC 1 1 0.90 0.68 0.45 0.32 0.24
26 PSNR 34.4 29.0 24.3 21.1 18.7 16.8 15.4
NC 0.97 0.97 0.96 0.87 0.71 0.56 0.42
Fig. 2. The positions of DCT coefficients within an image block.
S.D. Lin et al. / Computer Standards & Interfaces 32 (2010) 54–60 57
Fig. 4. Watermarks retrieved from marked images Lena after JPEG compression with compression ratios 40 and 43, respectively, when the modulus M is 18.
Fig. 6. Watermarks retrieved from marked images F16 after JPEG compression with compression ratios 93 and 100, respectively, when the modulus M is 18.
58 S.D. Lin et al. / Computer Standards & Interfaces 32 (2010) 54–60
Table 3 Table 4
NC values under JPEG compression with different quality factors (CR: compression Simulation results of common image processing attacks.
ratio).
Quality factor 90 60 30 20 15 10 9 8
Lena CR 15.6 26.2 46.8 63.4 78.2 102.5 111.7 124.0
PSNR 29.5 28.8 28.5 27.8 27.2 26.1 25.8 25.4
NC 1 0.99 0.98 0.98 0.90 0.96 0.73 0.49
F16 CR 15.5 25.0 43.3 57.7 70.4 93.3 100.7 110.3
PSNR 31.5 30.3 29.8 28.8 28.0 26.8 26.5 26.1
NC 1 1 1 1 0.84 0.91 0.71 0.40
Baboon CR 7.3 13.1 22.3 31.0 39.1 55.6 61.9 69.1
PSNR 24.7 24.2 23.6 22.9 22.4 21.5 21.3 21.0
NC 1 1 1 1 0.84 0.88 0.54 0.47
Scene CR 11.0 18.8 32.5 44.1 54.8 74.5 81.2 89.5
PSNR 27.7 26.8 26.4 25.7 25.2 24.1 23.9 23.6
NC 1 0.99 0.99 0.96 0.85 0.85 0.57 0.46
8
>
> M
<0 ; if ð jC ði; jÞjmod MÞb
2
b= ð7Þ
>
>
: 1 ; if ð jC ði; jÞjmod M Þz M
2
4. Secret keys
1. The parameters for Torus automorphism permutation: Torus images is evaluated by the peak signal-to-noise ratio (PSNR) criterion
automorphism permutation has been introduced in Section 2. defined as Eq. (9).
The disarranging parameters k and m were defined in the first step
of watermark embedding algorithm. These parameters are neces- P
31 P
31
W ði; jÞ × W ⁎ði; jÞ
sary when reconstructing the extracted watermark pattern. i=0 j=0
NC = ð8Þ
2. The record of selected image blocks: the record of image blocks P
31 P
31
½W ði; jÞ2
selected for watermark bits embedding has to be preserved well for i=0 j=0
watermark information extraction.
3. The embedding positions of watermark bits: the number of DCT 2
coefficients and the positions of them that were designed for Emax × Iw × Ih
PSNR = 10 log10 P 2 ð9Þ
watermark bits embedding have to be protected well for water- ⁎
Ix;y −Ix;y
mark extraction.
4. The modulus used in the proposed algorithm: the modulus M used
In Eq. (9), Iw and Ih are the width and height of the watermarked
in the watermark information embedding step is necessary in the
image, respectively. Ix,y is the original image pixel value at coordinate
step of watermark bits extracting.
(x, y) and ⁎Ix,yis the altered image pixel value at coordinate (x, y). Emax is To show the improvement of the proposed scheme in terms of JPEG
the largest energy of the image pixels (i.e., Emax = 255 for 256 gray-level compression, we compare our scheme with the earlier works, [9] and
images). Moreover, the compression ratio of the JPEG-compressed image [10], and the performance comparison is given in Table 5. Note that
is obtained by dividing the file size of the original uncompressed image by “NA” means the corresponding experimental datum is unavailable. As
that of the JPEG-compressed image. shown in Table 5, the watermark embedded by the proposed scheme
The simulation results of the gray-level image, Lena, are given in can be almost fully extracted from the marked image when the com-
Tables 1 and 2. Table 1 lists the NC values of extracted watermarks and pression ratio is 53. However, under the same circumstance, the
the image quality (i.e., the PSNR values) of watermarked images after watermarks embedded by [9] and [10] cannot survive after attacked
attacked by JPEG compression with different compression ratios. It by JPEG compression with compression ratios 20 and 25, respect-
shows the embedded watermark can be almost fully extracted from ively. It demonstrates that the proposed scheme achieves a good
the JPEG-compressed image with compression ratio 53 when the improvement on the robustness against JPEG compression. Note
modulus M is 26. Table 2 shows the NC values of extracted watermarks that in Tables 1, 3, and 5, some of the NC values increase when the
after attacked by adding different percentages of uniform noise on compression ratio increases. This is because both the proposed water-
watermarked image. Note that in Tables 1 and 2, the NC values are not marking system and the JPEG compression system are not linear
equal to 1 when the modulus M equals 26 in the circumstance that no systems. For the robustness at high compression ratio and the visual
attack has been performed on the watermarked image. This is because quality of marked image, the applied steps or parameters in the
the steps of inverse DCT transformation, the weighted correction, and proposed algorithm may introduce a little distortion on the embedded
the inverse YUV color transformation in the proposed watermark watermark information. In addition, during JPEG compression attack,
embedding algorithm introduce a little distortion on the embedded the marked image has to undergo several nonlinear transformation or
watermark information. Fig. 4 shows the watermarks retrieved from quantization procedures. Therefore, a small number of the embedded
the watermarked image Lena after attacked by JPEG compression with watermark bits can be distorted at higher compression ratio.
compression ratios 40 and 43, respectively. Note that although there are several alternative DCT coefficients
The simulation results of the color images, Lena, F16, Baboon, and at the low-frequency positions, the watermark bits are embedded into
Scene, are given in Figs. 5 and 6 and Tables 3 and 4. The modulus M the coefficients at positions C(0, 2) and C(2, 0) in our experiments. The
for watermark embedding is 18 in this experiment. Table 3 shows the reasons why we choose the two components to embed watermark
NC values of extracted watermarks after attacked by JPEG compres- are summarized as follows. The DCT coefficients at the positions C(0, 1),
sion with different quality factors. Note that the quality factor for C(1, 0), and C(1, 1) possess more significant information of image.
images is an integer value ranging from 1 to 99, which denotes the Embedding watermark into these positions based on the proposed
predetermined image quality. The larger the quality factor is assigned, scheme introduces too much quality degradation on the marked image.
the lower compression ratio the compressed image obtains and the In addition, it also makes the watermark information more perceptible.
better visual quality the compressed image retains. Fig. 5 illustrates The DCT coefficients at the positions C(0, 3), C(1, 2), C(2, 1), and C(3, 0)
the watermarked color images, together with their PNSR values. It are the higher-frequency components of image. Embedding watermark
reveals that good visual quality of watermarked images can be ob- into these components by the proposed scheme makes it easy to detect
tained by the proposed scheme. Fig. 6 shows the watermarks retrieved the existence of watermark by statistic methods. In addition, to survive
from the marked image F16 after JPEG compression with high compres- high-ratio JPEG lossy compression, it is improper to embed watermark
sion rations 93 and 100, respectively. As shown in Fig. 6, the extracted in the higher-frequency components of images. Therefore, for the
watermarks can be easily recognized by the human eyes. To show the purpose of preserving good visual quality for marked images and
robustness of the proposed watermarking scheme against common increasing the robustness of watermark, the watermark information are
image processing attacks other than JPEG compression, we conduct the embedded in the AC components at positions C(0, 2) and C(2, 0).
options provided in the software of PhotoShop on the marked image Table 6 shows the quantitative analysis of modulus M with respect
Lena. The marked images after being attacked and the retrieved to the visual quality of marked images and the robustness of em-
watermarks are listed in Table 4. As shown in Table 4, the proposed bedded watermarks. We use sixteen gray-level and color images in
scheme is robust to common image processing attacks such as cropping, this experiment. The averaged PSNR and NC values with respect to the
rotation, sharpening, invert, and so on. These experimental results modulus M are listed in this table. The experimental data demonstrate
illustrate that a noticeable improvement, both on the robustness and on that the larger the modulus M is, the more robustness the watermark
the imperceptibility, is achieved by the proposed scheme. obtains. However, a larger modulus introduces more distortion on the
Table 6
Modulus value M with respect to visual quality of marked image and robustness of watermark (CR: compression ratio).
M CR 0 10 20 30 40 50 60 70 80 90 100
4 PSNR 39.4 35.3 32.8 30.9 29.7 28.4 27.1 26.7 26.4 26.1 25.3
NC 1 1 0.98 0.96 0.93 0.84 0.76 0.61 0.49 0.43 0.36
8 PSNR 37.7 34.9 32.6 30.4 29.1 27.9 27.0 26.5 26.3 26.1 25.1
NC 1 1 0.98 0.96 0.94 0.87 0.81 0.71 0.65 0.57 0.42
12 PSNR 36.9 34.2 31.8 30.1 29.0 27.7 27.0 26.3 26.1 25.8 25.1
NC 1 1 1 0.99 0.93 0.90 0.83 0.74 0.65 0.56 0.43
16 PSNR 35.3 33.3 31.5 30.1 28.7 28.0 27.4 26.3 26.0 25.6 25.1
NC 1 1 0.99 0.99 0.98 0.93 0.91 0.84 0.79 0.66 0.57
20 PSNR 34.2 32.4 31.0 29.8 28.6 28.0 27.3 26.1 25.5 25.3 24.9
NC 1 1 0.98 0.97 0.97 0.97 0.94 0.89 0.83 0.76 0.67
24 PSNR 32.4 32.0 31.0 29.6 28.5 27.4 26.9 25.8 25.2 24.9 23.4
NC 1 0.99 0.98 0.98 0.98 0.96 0.97 0.89 0.85 0.79 0.70
28 PSNR 31.3 30.5 29.7 29.0 28.1 27.3 26.1 25.3 24.8 24.1 22.9
NC 1 0.99 0.99 0.97 0.98 0.95 0.92 0.90 0.85 0.80 0.71
60 S.D. Lin et al. / Computer Standards & Interfaces 32 (2010) 54–60
marked images. In our opinion, the modulus M should be set a value [3] K. Gopalakrishnan, N. Memon, P.L. Vora, Protocols for watermark verification, IEEE
Transactions on Multimedia 8 (4) (2001) 66–70.
between 16 and 26. [4] C.Y. Lin, S.F. Chang, A robust image authentication method distinguishing JPEG
compression from malicious manipulation, IEEE Transactions on Circuits and
6. Conclusions Systems for Video Technology 11 (2) (2001) 153–168.
[5] W. Lu, H. Lu, F.L. Chung, Novel robust image watermarking using difference
correlation detector, Computer Standards & Interfaces 29 (2007) 132–137.
An improved DCT-based image watermarking technique has been [6] M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data-embedding and
introduced in this paper. The watermark is embedded into a digital watermarking technologies, Proceedings of the IEEE 86 (6) (1998) 1064–1087.
[7] C.D. Vleeschouwer, J.F. Delaigle, B. Macq, Invisibility and application functionalities
image, based on the concept of mathematical remainder, by modifying in perceptual watermarking an overview, Proceedings of the IEEE 90 (1) (2002)
the low-frequency coefficients in DCT frequency domain. With the 64–77.
proposed scheme, the embedded watermark can successfully survive [8] J. Huang, Y.Q. Shi, Y. Shi, Embedding image watermarks in DC components, IEEE
Transactions on Circuits and Systems for Video Technology 10 (6) (2000) 974–979.
after attacked by image processing operations, especially for the JPEG
[9] S.D. Lin, C.F. Chen, A robust DCT-based watermarking for copyright protection, IEEE
compression with high compression ratio. Moreover, the watermark Transactions on Consumer Electronics 46 (3) (2000) 415–421.
embedding and extracting processes are very simple and the water- [10] S.D. Lin, S.C. Shie, C.F. Chen, A DCT based image watermarking with threshold
mark is self-extractable. Simulation results show that the proposed embedding, International Journal of Computers and Applications 25 (2) (2003)
130–135.
scheme outperforms the earlier works. Therefore, we conclude that [11] C.C. Chang, J.Y. Hsiao, C.L. Chiang, An image copyright protection scheme based on
the new proposed technique is more suitable for images that will be torus automorphism, Proceedings of the First International Symposium on Cyber
highly JPEG-compressed and transmitted on the Internet. Worlds (2002) 217–224.
[12] M. Engedy, V.N.K. Munaga, A. Saxena, A robust wavelet based digital watermarking
scheme using chaotic mixing, Proceedings of the First International Conference on
Acknowledgements Digital Information Management (2006) 36–40.
[13] G. Voyatzis, I. Pitas, Chaotic mixing of digital images and applications to
watermarking, Proceedings of the European Conference on Multimedia Applica-
The authors are supported by National Science Council (Taipei, tions, Services and Techniques 2 (1996) 687–695.
Taiwan, ROC), National Dong Hwa University (Hualien, Taiwan, ROC),
and National Formosa University (Hu-Wei, Yunlin, Taiwan, ROC).
References
[1] J.L. Liu, D.C. Lou, M.C. Chang, H.K. Tso, A robust watermarking scheme using self-
reference image, Computer Standards & Interfaces 28 (2006) 356–367.
[2] D.C. Lou, H.K. Tso, J.L. Liu, A copyright protection scheme for digital images using
visual cryptography technique, Computer Standards & Interfaces 29 (2007) 125–131.