A CDMA Watermarking Scheme For Subspace Projection Based On PS Sequence

DOI : 10.17577/IJERTV1IS8072

Download Full-Text PDF Cite this Publication

Text Only Version

A CDMA Watermarking Scheme For Subspace Projection Based On PS Sequence

N.VEDA KUMAR Y.DAVID SOLOMON RAJU

M.Tech Student , ES, Associate Professor,

Dept of Electronics and Communication Dept of Electronics and Communication Engineering, Engineering,

Holy Mary Institute of Technology &Science Holy Mary Institute of Technology &Science,

Bogaram(v),Keesara(m),R.R.Dist,A.P,India. Bogaram(v),Keesara(m),R.R.Dist,A.P,India.

Abstract

In this paper ,we introduced a novel method CDMA based watermarking scheme on the basis of orthogonal pseudorandom sequence subspace projection. In this paper a new idea to eliminate the correlation between the host image and the pseudorandom sequence in the encoding watermark extraction phase, compare the performance of wavelet and multi wavelet based CDMA watermarking scheme, and improve the robustness and message capacity of the watermarking scheme. In our proposed scheme implements the steps and performance testing under different attack conditions by a series of experiments. The experimental results observe the Host image under different attacks and show the higher robustness and increase the message capacity and achieve the high capacity to hide the data.

Keywords-CDMA watermarking, high-capacity, subspace projection, wavelet transform,

I.INTRODUCTION

One of the present computer generations behind the increased use of copyright marking is the growth of the Internet which has allowed images, audios, video ,etc .Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authentication or identification of the owners.

Basically digital watermarking is classified into two types first one is fragile and second one is robust. A digital watermark is called fragile it resists benign transformations, but the fragile watermarks commonly used to detect the

informations and it can be easily changed. Fragile water marks are used in tamper detection, semi fragile watermarks are commonly used to detect malignant transformations.

A digital watermark is called robust if it resists a designated transformations. robust watermarks used in copy protection applications carry copy and no access control information.

Basically digital watermarking may be used for wide range of applications.

  1. Data copy protection system

  2. source tracking(different source elements get differently watermarked)

  3. Broad cast monitoring(television news often contains watermarked video from international agencies)

A watermarking system is usually divided into three distinct steps , embedding, attack, detection. the watermarked signal is transmitted or stored, usually transmitted to anther person if the person makes the modifications is called the attacks. Detection is an algorithm which is applied to the attacked signal to attempt the extract the watermark form, the signal where the watermark is to be embedded is called the host image.

Canonical CDMA watermarking schemes have a serious drawback that the message capacity is limited. If we increase the message size and keep imperceptibility, then the bit error rate (BER) of the extracted watermark increases quickly. Most of the CDMA based schemes proposed so far have shown

non-zero Bit Error Rate (BER) even if the watermarked image has not been attacked. In order to improve the message capacity researchers proposed wavelet domain CDMA watermarking schemes, decompose the host image into LL,LH,HL and HH sub bands and choose one or two of them for watermark embedding, In our paper we have to improve the robustness and message capacity of the respected watermarking scheme we use PS subspace projection. One application of watermarking is in copyright protection systems. In this use ,a copy device retrieves the watermark from the signal before making copy; the device makes a decision whether to copy or not, depending on the contents of the watermark.

In order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as zero-bit or presence watermarking scheme. Some times this type of watermarking scheme is called 1-bit watermark, when 1 denotes the presence(0 and absence)of a watermark. The message is n-bit long stream ( m m1, m2 ,…….mn ).

This type of schemes usually are referred to as multiple- bit watermarking or non zero bit watermarking schemes[6]-[9].

A watermark is a secure of knowing the algorithms for embedding and extracting help unauthorized party to detect or remove the watermark payload. Basically CDMA system, has different type of the noise signals or message signals are hidden into particular elements and it has a secure way of watermarking and increases robustness. In this type of the multiple signals that overlap and combine and separable. The separability is achieved by near orthogonal PS sequence prior to carrier modulation. Compare the performance testing of wavelet and multi wavelet based CDMA watermarking scheme that can improve the robustness and pseudorandom sequence has some correlation to host image representing locations to overcome these elements.

In this paper, we propose a high capacity CDMA watermarking scheme based on orthogonal pseudorandom sequence subspace projection. We

eliminate the interference of the host images contents by subspace projection. Experimental results show that the robustness and the message capacity are highly improved.

There is a vast literature on robustness and message capacity of watermarking schemes. But most of the early spread spectrum schemes deals only with 1-bit systems that yield only a simple yes/no answer with respect to the presence of the watermark or visual logo. Multi-bit spread spectrum watermarking systems are not realizable until the CDMA principles are introduced into the area of watermark[11]-[13]. Even though, the message capacity of the watermarking schemes is limited. In their system has use wavelet and multi wavelet based CDMA systems has used and the host image is first transformed into sub bands and using balance multi wavelet to design high- capacity watermarking schemes.

  1. WATERMARKING SCHEMES

    1. The Channel Model of Canonical CDMA based Watermarking Schemes

      Since discrete wavelet transform (DWT) is believed to more accurately models aspects of the Human Visual System(HVS) as compared to the FFT or DCT, watermark information are embedded in the wavelet domain for many CDMA based watermarking schemes. The host image is first transformed by orthogonal or bi orthogonal wavelets to obtain several sub band images (each sub band image consists of wavelet coefficients). Then some of them are selected for watermark embedding, Supposed sub band image I is chosen for watermark embedding and the message is represented in binary form b (b1,b2 , bl ) Where bi 0,1 ,We first

      transform b into a binary polar sequence m of

      {-1,1} by the following formula

      Mi=1-2bi, i=1,2,—–L (1)

      \

      1

      According to the CDMA principles, the message M is encoded by L uncorrelated Pseudo sequence s , s2 , sl generated by a series

      key, such as m sequences, gold sequence, etc..

      Since it is possible to make them orthogonal with each other, we simply assume that they are orthogonal unit vectors,i.e

      mi 1

      otherwise

      si, s j i, j

      0, i j I,j=1,2.L(2)

      1, i j

      1

      Where denotes the estimated value of , This equivalent to nelecting of correlation between and the host image I and the correlation between

      Where .,. denotes inner product operation. The

      pseudorandom noise pattern W is obtained as follows

      L

      W mi si , .(3)

      i1

      Which submerges the watermark message. Then

      s and the attack distortion n. When the message size is small, we can take a large watermark strength parameters ,so we have no problem to neglect those small values. But when the

      message size is large, problem occurs. For the convenience of analysis, we ignore the third term in (6)at present.

      the pseudorandom noise pattern W is embedded

      si ,Iw

      si ,I

      mi .(8)

      into the sub band image I as follows

      IW I W (4) Where is a positive number, called the watermark strength parameter. Then an inverse wavelet transform is performed to obtain the

      watermarked image. In the watermark extracting phase, the watermarked image is transformed by the same wavelet transform that is used in the watermark embedding phase to obtain the sub band image that contains the watermark message.

      IW I W n ..(5)

      Where n is the distortion due to attacks or simply quantization errors if no other attack is performed. Then the orthogonal pseudo

      sequences{ s1,s2…..sl }are generated using the

      As the message size increases, the watermark strength parameter becomes smaller and smaller in order to keep the imperceptibility. So the influence of the host images contents becomes more and more prominent as the message size increases. Experimental results also confirm this fact. So we must find a way to eliminate or reduce the interference of the host image so that we can improve the of the CDMA watermarking schemes considerably.

      1. HighCapacityCDMAWatermarking Scheme

        In the previous subsection we have analyzed, the influence of the host images content to the robustness of the canonical CDMA watermarking schemes. In order to eliminate this influence, we project the host image onto the linear subspace S generated by the orthogonal pseudorandom sequences.

        key and their inner product between each si

        and L

        i is computed.

        w

        Ps I

        i1

        si ,I si ,..(9)

        si ,iw si ,I mi si ,n (6)

        If we keep the projection coefficients

        The canonical CDMA based methods decide the sign of mi by computing the inner product on

        ci si ,I :i 1,….L as a secret key,

        then we can substrate P I from the sub band

        the left most of s

        image I before watermark extraction, there before watermark extraction, therefore ,we can decide

        the sign of mi

        computing.

        si , I w Ps I

        si , I W Ps I

        si ,W mi , (10)

        Which is not affected by the host images contents, and therefore, provides a more robust way for CDMA based watermarking.

      2. Watermark Embedding Process

      The watermark embedding process of the proposed high capacity CDMA scheme is the same as the canonical one expect for a preprocessing step of calculating the projection

      coefficients ci si ,I :i 1,….L

      which should be kept a key for watermark extraction.

      Here we give the watermark embedding steps:

      Step1: decompose the host image into sub band images using orthogonal or biorthogonal discrete wavelet transform(DWT) and chose one or several sub band images I for watermark embedding.

      Step2: generate the orthogonal pseudorandom sequences s1, s2 ,…..sL usingthesecretkey(key

      1).

      Step3: project the sub band images I onto the linear subspace S generated by the orthogonal pseudo sequences, and keep the projection

      Step 4: encode the watermark information using the formula(1)and to get(3) the pseudorandom noise pattern W.

      Step:5 embed the pseudorandom noise pattern W into the sub band images I .

      Step:6 perform inverse discrete wavelet transform (IDWT) to obtain the watermarked image.

      D. Watermark Extraction Process

      Now we give the watermark extraction steps: Step:1 decompose the received image into sub band images using the same wavelet transform as the one used in the watermark embedding phase, and choose the corresponding sub band images Iw for watermark extraction.

      1

      Step:2 generate the orthogonal pseudorandom sequence s , s2 , sl usingthesecretekey(key

      1).

      Step:3 eliminate the projection component from

      Iw

      L

      IW Iw PS (I ) Iw cj s j , (11)

      coefficients ci si ,I :i 1,….L as

      j 1

      the second secret key (key2), which will be used in the watermark extraction phase.

      Where C are the projection coefficients kept in the second secrete key (key2).

      Step:4extracttheembeddedmessage

      m (m1, m2 ,…..ml ) by correlation detection.

      1

      mi 1

      si , Iw 0

      ,otherwise(12)

      Step:5transform the extracted message into the original watermark b (b1,b2 ,….bl ) .

      bi (1 mi ) / 2 i=1,2..L .(13)

  2. PERFORMANCE TEST

We have performed a series of experiments to test the robustness of the proposed scheme. Seven 512×512 grayscale images are chosen as test images. The watermarks are binary sequences of different size. The pseudorandom number generators and we orthogonalize them by Cholesky decomposition method. Of course other choices of pseudo sequences such as m sequences, gold sequences may be more suitable for watermarking.

A.Capacity VS Bit Error Rate (BER)

The first test we have performed is to test the relationship between message capacity and the bit error rate of the extracted watermark for both the canonical and newly proposed schemes. The bit error rate(BER) is calculated by the following formula.

Where W denotes the original watermark, EXW denotes the extracted watermark. In this test, we embed the watermarks into the lower resolution approximation image(LL) of the 2-level biorthogonal discrete wavelet decomposition of the test image using both canonical and the newly proposed CDMA based schemes, no attack is performed on the watermarked image except for quantization errors. Then extract watermarks from the watermarked image using corresponding watermark extraction schemes and compare the extracted watermark with the original one. The watermark size vary from 16 to1015,we have chosen 11discrete values for our test. For each watermark size values ,we perform the watermark embedding and extracting process on all7 test images, and calculate the average BER

.In the whole test we carefully adjust the watermark strength parameters so that the peak signal to noise ratio (PSNR) of the watermarked image take approximately the same value for different watermark sizes and different test images.

The horizontal axis indicates the information capacity, the number of bits embedded in the test

1 m n

image. The vertical axis indicates the average

mn

BER W (i, j) EXW (i, j)

i1 j 1

.(14)

BER.We see that as the information capacity increases the BER of the canonical CDMA based scheme increases and approaches to 0.5. But for the proposed scheme ,the bit error rate keeps to be zero until the message capacity takes the value of 1024 bits. Of course if the message capacity keeps on increasing ,the bit error rate cannot always be zero, it will increase and approach to

0.5 in the long run. On the hand, for the canonical scheme, if the message size is large ,the bit error rate is high even no attack is performed on the watermarked image. This phenomenon has not taken place in the tests for the proposed scheme yet. The reason is that the interference of the correlations between the test image and the pseudorandom sequence used for encoding the watermark message is cancelled in the proposed

Fig.2 The relation ship between message capacity

and the bit eror rate of the extracted watermark.

scheme. Proposed scheme has higher information capacity than the canonical CDMA based watermarking scheme when no attack other than quantization errors is performed.

B. Robustness to Noise Attacks

The second test is to test the robustness to noising attacks of both schemes. In this test, we first generate binary watermarks of capacity 128,256,512 and 1024 bits, then embed them into the 7test images using both watermark embedding schemes to generate 14 watermarked images, and then add Gaussian noise of different intensity to the watermarked images to generate the noising attacked images using corresponding watermark extraction scheme. The intensity of noising attack is measured by noise rate RI. i.e.

compressor with quality factors vary from 100 to 1 before watermark extraction . The BER of both schemes under JPEG compression attacks with different quality factors. The horizontal axis indicates the quality factor that measures the extent of lossy JPEG compression, the smaller the quality factor, the higher compression extent. We see that the proposed scheme is highly robust to JPEG compression.

D.Robustness to other Attacks

We test the robustness to median filtering and jitter attacks of both schemes. In the median filtering test, we filter the watermarked image using a 5×5 median filtering template before watermark extraction, we first randomly drop a row and a column of the watermarked image, then randomly duplicate a row and column to keep the image size unchanged. This attack can destroy the synchronization of the watermark, which often leads to the failure of watermark extraction for many existing watermarking schemes. The experimental data are in list table

I. We see that the proposed scheme is robust to both attacks but the canonical scheme is not.

Image quality VS BER for JPEG attacks of different attack intensity.=

IV.CONCLUSIONS

In this paper ,we propose a high-capacity CDMA

RI

R

(15)

watermarking scheme based on orthogonal pseudorandom sequence subspace projection. The

We have added Gaussian noise with RI vary from 0.05 to 0.5 and calculated the average BER of the extracted watermark for each RI value and each value of watermark capacity, theBER- RIplotwith watermark capacity=1015, 512,256,128. We see that BER of the new scheme is much smaller than the one of the canonical scheme.

R max I (x, y) min I (x, y) .(16)

C.Robustness to JPEG Attacks

The third test is to test the robustness to JPEG attacks of both schemes. In this. We compress the watermarked images using JPEG

proposed scheme eliminates the interference of the host image in the watermark extraction phase by subtracting the projection components ( on the linear subspace generated by the pseudorandom sequences) from the host image. So it is more robust than the canonical CDMA based scheme. We find that the proposed scheme shows higher robustness than the canonical scheme under different attack conditions. The expense of high robustness is that an additional key that consists of projection coefficients is needed for the watermark extraction. But this additional memory cost is worth while in many situations since it improves both robustness and security of the watermarking system. In the near future we will analyze and test the proposed scheme intensively and use it to

design watermarking systems resistant to geometrical attacks and print-and-scan-attacks REFERENCES

[1]A.Malleswari,L.SrinivasARobustWatermarkin g Scheme In Direct Sequence CDMA Based On Orthogonal PN Sequence International Journal of Engineering Research and Applications(IJERA).

  1. Shouyuan Yang, Ahanjie Song,jong hyuk park A High-Capacity CDMA Watermarking Based on Orthogonal Pseudorandom Sequence Subspace Projection IEEE Conference on Multimedia and Ubiquitous Engineering ,mar 2011,pp.33-38

  2. Santi P. Maity, Malay K.Kundu,A Blind CDMA Image Watermarking Scheme In Wavelet Domain, International Conference on Image Processing,vol4,Oct.2004,pp.2633-2636.

  3. Chris Shoemaker, Hidden Bits: A Survey of TechniquesforDigitalWatermarking.Avaliable:http/ www.vu.union.edu/-shoemakc

[5]J.K.Joseph,O.Ruanaidh,P.Thierry,Rotation,Sca le and Translation Invariant Spread Spectrum Digital

ImageWatermarking,SignalProcessing.Vol.66(3), 1998,pp.303-317

[6] C.G.M.Silvestre, W.J.Dowling,Embedding data in Digital Images Using CDMA TechinquesIn:proc.of IEEE int.conf.on Image processing ,Vancouver, Canada 1(2000)589-592

[7]T.Kohda,Y.Ookubo,K.Shinokura,Digital Watermarking Through CDMA Channels Using Spread Spectrum Techniques ,In IEEE 6th Int.Sym.on Spread Spectrum Techniques and applications,pasippany,NJ,USA,Vol,2,2000,pp671- 674

[8]B.Vassaux,P.Bas,J.M.Chassery,ANew CDMA TechniquesforDigitalimageWatermarkingEnhancin gCapacityofInsertionandRobustness,In:proc.ofIE EEInt.Con.onImageProcessing.Thessalonica,Greec e,Vol.3,2001,pp.983-986

[9]G.M.Bijan,ExploringCDMAforWatermarkingo fDigitalvideoVillanovaUniversity,Villanova,PA, USA,1985,http:/www.ece.villanova.edu/mobasser/ mypage/3657-10.pdf

[10] G.M.Bijan,Direct Sequence Watermarking of DigitalVideoUsingmframes,In:proc.ofIEEEInt.Co

nf.onImageProcessing,Chicago,Illinois,USA,Vol.2 (1998)399-403.

[11]L.Xie and G.R.Arce,Jointwavelet compression and authentication watermarking, in Proc.IEEE ICIP,Chicago,USA, vol.2,pp.427- 431,oct,1998.

[12]H.Inoue,A.Miyazaki,A.Yamamoto,andT.Katsu ra,A digital watermark based on the wavelet transform and its robustness on the image compression,inProc.IEEEICIP,Chicago,USA,vol. 2,pp.391-395,oct,1998.

[13] Jong RYUL Kim and Young Shik Moon, A robust wavelet-based digital watermark using leveladaptivethresholding,inProc.ICIP,Kobe,Japa n,pp.202-212,oct.1999.

[14]G.Langelaar,I.Setyawan,R.L.Lagendijk,Water marking digital Image and video data, in IEEE signalprocessingmagazine,vol17,pp,2043,Septemb er 2000.

  1. M.Hsieh,D.Tseng, and Huang,Hiding digital watermarking using multiresolution wavelet transform,IEEETrans,onIndust,Elect,vol48,pp.87 5-882,oct 2001

  2. Y.seo,M.Kim,H,Chung,y.Huh,and J.Lee,A secure watermarking for jpeg-2000,in Proc.IEEE ICIP,2001,Thessaloniki,Greece,vol 2,pp 530- 533,oct 2001.

  3. P.Su,H M.Wang, and c.j.juo,An integrated approach to image watermarking and jpeg-2000 compression,J.VLSI Signal processing vol.27,pp.35-53,Jan,2001.

.

Leave a Reply