DCT-BASED DIGITAL IMAGE WATERMARKING VIA IMAGE SEGMENTATION TECHNIQUES

更新时间:2023-06-23 15:14:31 阅读: 评论:0

DCT-BASED DIGITAL IMAGE
WATERMARKING VIA IMAGE
SEGMENTATION TECHNIQUES Abstract: In recent years, digital watermarking techniques have been propod to protect the copyright of multimedia data. Different watermarking schemes have been suggested for images. This paper propos a watermarking algorithm bad on image gmentation and discrete cosine transform (DCT). The image is first gmented using expectation maximization (EM) algorithm. For each gment, the image gment is subdivided into pixels blocks of size 8× 8 (64pixels), and zigzag reordered. The DCT of the block is then computed. Then, a pudorandom quence of real numbers is embedded in the DCT domain of each image gment. Different experiments are conducted to show the performance of the scheme under different types of attacks. The results show that our propod watermark scheme is robust to common signal distortions, including geometric manipulations.
Keywords: Discrete cosine transform (DCT), digital watermarking, image gmentation
1. INTRODUCTION
Most watermarking rearch and publications are focud on digital images. The reason might be that there is a large demand for image watermarking products due to the fact that there are so many images available at no cost on the World Wide Web which need to be protected. Meanwhile, the number of image watermarking publications is too large. However, most techniques share common principles. The watermark signal is typically a pudorandom signal with low amplitude, compared to the image amplitude, and usually with spatial distribution of one information (i.e., watermark) bit over many pixels.
A lot of watermarking methods are in fact very similar and differ only in parts or single aspects of the three topics, signal design; embedding; and recovery. The information that is embedded is usually not important for the watermarking itlf. However, there are methods that are designed to embed and extract one out of a codebook of codes, and thus cannot accommodate arbitrary information. Other propod schemes modulate the codes available in the codebook with arbitrary information bits and can thus accommodate arbitrary messages.
The watermark signal is often designed as a white or colored pudorandom signal with, e.g., Gaussian, uniform or bipolar probability density function. In order to avoid visibility of the embedded watermark, an implicit or explicit spatial or spectral shaping is often applied with the goal to attenuate
the watermark in areas of the image where it would otherwi become visible. The resulting watermark signal is sometimes spar and leaves image pixels unchanged, but mostly it is den and alters all pixels of the image to be watermarked. The watermark signal is often designed in the spatial domain [1],[2],[3],[4],[5] and [6], but sometimes also in a transform domain like the full-image discrete cosine transform (DCT) domain, block-wi DCT domain [7], [8],[9],[10] and discrete wavelet transform (DWT) [11],[12].
The signal embedding is done by addition or signal-adaptive (i.e., scaled) addition, mostly to the luminance channel alone, but sometimes also to color channels, or only to color channels. The addition can take place in the spatial domain, or in transform domains such as the discrete Fourier transform (DFT) domain, the full-image DCT domain, the block-wi DCT domain [7],[8],[9], the wavelet domain [11],[12], the fractal domain, the Hadamard domain, the Fourier–Mellin domain, or the Radon domain. It is often claimed that embedding in the transform (mostly DCT or wavelet) domain is advantageous in terms of visibility and curity.
祝福你The main contribution of this paper is to prent a new watermarking scheme that is bad on expectation maximization (EM) gmentation algorithm and discrete cosine transform (DCT). Section 2 prents the main requirements and applications of watermarking. Section 3 discuss the
image gmentation techniques. The propod watermarking scheme is prented in Section 4. This is followed by the experiment results in Section 5. Finally, the conclusions are prented in Section 6.
海蛎子怎么保存2. IMAGE WATERMARKING REQUIREMENTS AND APPLICATIONS
Each watermarking application has its own specific requirements. Therefore, there is no t of requirements to be met by all watermarking techniques.
Perceptual Transparency: In most applications the watermarking algorithm must embed the watermark such that this does not affect the quality of the underlying host data. A watermark-embedding procedure is truly imperceptible if humans cannot distinguish the original data from the data with the inrted watermark. Even the smallest modification in the host data may become apparent, however, when the original data is compared directly with the watermarked data. Since urs of watermarked data normally do not have access to the original data, they cannot perform this comparison. Therefore, it may be sufficient that the modifications in the watermarked data go unnoticed as long as the data are not compared with the original data.
Robustness: It is desirable that the watermark always remains in the host data, even if the quality of
the host data is degraded. Examples of degradations are lossy compression techniques, filtering, re-sampling, digital-analog (D/A) and analog-digital (A/D) conversion.
狼尾花
There are many applications for watermarking including copyright protection, fingerprinting, copy protection, broadcast monitoring, data authentication, indexing, medical safety, and data hiding.
There are three main issues in the design of a watermarking system [1]: •Design of the watermark signal to be added to the host signal. Typically, the watermark signal depends on a key and watermark information.蜂蜜会变质吗
•Design of the embedding method itlf that incorporates the watermark signal into the host data yielding watermarked data.
• Design of the corresponding extraction method that recovers the watermark information from the signal mixture using the key and with help of the original or without the original
The first two issues, watermark signal design and watermark signal embedding, are often regarded as one, specifically for methods were the embedded watermark is host signal adaptive.
Watermark and/or
(a)                                                                (b)
Figure 1. Digital watermarking embedding and detecting systems
Figure 1 illustrates the concept. Figure 1(a) shows the generic watermarking scheme for the embedding process. The input to the scheme is the watermark, the host data, and an optional public or cret key. The host data may, depending on the application, be uncompresd or compresd, however, most propod methods work on uncompresd data. The watermark can be of any nature,
such as numbers, text, or an image. The generic watermark recovery process is depicted in Figure 1(b). Inputs to the scheme are the watermarked data, the cret or public key, and, depending on the method, the original data and the original watermark. The output of the watermark recovery process is either the recovered watermark or some kind of confidence measure indicating how likely it is for the given watermark at the input to be prent in the data under inspection.
3. IMAGE SEGMENTATION TECHNIQUES
A central problem, called gmentation , is ud originally to distinguish objects from background or objects from each other. For intensity images (i.e., tho reprented by point-wi intensity levels) four popular approaches are: threshold techniques, edge-bad methods, region-bad techniques, and connectivity-prerving relaxation methods.
Segmentation algorithms also include expectation-maximization algorithm [13], K-means algorithm [14], and other clustering techniques such as QT clustering algorithm and Fuzzy c-means clustering algorithm. In statistical computing, the expectation-maximization (EM) algorithm [13] is an algorithm for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobrved latent variables. EM is frequently ud for data clustering in machine learnin
g and computer vision. EM alternates between performing an expectation step, which computes an expectation of the likelihood by including the latent variables as if they were obrved, and a maximization step, which computes the maximum likelihood estimates of the parameters by maximizing the expected likelihood found on the expectation step. The parameters found on the maximization step are then ud to begin another expectation step, and the process is repeated.红豆椰汁糕
The K-means algorithm [14] is an algorithm to cluster objects bad on attributes into k partitions. It is a variant of the expectation-maximization algorithm in which the goal is to determine the k means of data generated from gaussian distributions. It assumes that the object attributes form a vector space. The objective it tries to achieve is to minimize total intra-cluster variance. The algorithm starts by partitioning the input points into k initial ts, either at random or using some heuristic data. It then calculates the mean point, or centroid, of each t. It constructs a new partition by associating each point with the clost centroid. Then the centroids are recalculated for the new clusters, and algorithm repeated by alternate application of the two steps until convergence, which is obtained when the points no longer switch clusters (or alternatively centroids are no longer changed). The algorithm has remained extremely popular becau it converges extremely quickly in practice. In fact, many have obrved that the number of iterations is typically much less than the number of poi游泳装
nts.  4. PROPOSED DCT-BASED IMAGE WATERMARKING VIA IMAGE SEGMENTATION TECHNIQUES
未来规划Inspired by some of the ideas propod by Cox et al. [7] and the algorithm in [8], we have constructed our algorithm.  In [8] their algorithm rather than embedding the watermark globally in the host image as the Cox algorithm, the original image is first gmented bad on Voronoi diagram and the feature extraction points.
Our propod algorithm is bad on image gmentation and discrete cosine transform. The image is first gmented using
expectation maximization gmentation algorithm, and then each gment is divided into 8×8 blocks (64 pixels). A zigzag reordering is plied to each block of each gment (e Figure 2).  ap
Figure 2. Zigzag reordering algorithm.
For each 8×8 block in the gments a two dimensional discrete cosine transform (2D-DCT) is applied. The DCT coefficients of each gment are then lected to be modified by the watermark in which we embed a pudorandom quence of real numbers in the DCT coefficients of each gme
nt of the host image. This will boost the watermark robustness with affecting the invisibility. The embedding of the watermark is applied to each gment of the image.
To get the watermarked image, the rever process is applied in which the two-dimensional inver discrete cosine transform (2D-IDCT) is preformed on each  8×8 block of each gment.  Each 8×8 block is reordered using dezigzag reordering which is the inver of the zigzag reordering mentioned above. Finally the gments are merged together to form the watermarked image.
The two dimensional DCT ud in our algorithm is given by
∑∑−=−=++=1010
,2)12(cos 2)12(cos ),(),(M x N y v u N v y M
u x y x I v u C ππαα        (1)  for 10−≤≤M u  ,  10−≤≤N v  and天使翅膀简笔画
⎪⎩⎪⎨⎧−≤≤==11201M u M u M u      ,                  ,α,  ⎪⎩⎪⎨⎧−≤≤==1
1201N v N v N v      ,                ,α  (2)

本文发布于:2023-06-23 15:14:31,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/82/1021961.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:翅膀   蜂蜜   红豆   简笔画   变质   椰汁
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图