Image analysis – Applications
Reexamination Certificate
2000-08-18
2004-04-13
Boudreau, Leo (Department: 2621)
Image analysis
Applications
Reexamination Certificate
active
06721439
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to watermarking of digital data and in particular to the technique of embedding watermark data into digital image data and recapturing the embedded watermark data from a noisy version of the watermarked digital image without the use of the original digital image data.
BACKGROUND OF THE INVENTION
The fast development of digital information technology, combined with the simplicity of duplication and distribution of digital data across communication networks like the Internet (using, e.g., publicly accessible web sites), has exposed content providers to a real challenge of how to protect their electronic data (e.g., images, video, sound, text). This has stimulated many research efforts towards the design and study of sophisticated watermarking and information hiding methodologies for copyright protection.
Watermarking techniques are used to embed secret information into, for instance, an image in such a way that this information cannot be removed or deciphered without access to a secret key. On the other hand, to maintain quality, the watermarked image needs to be perceptually identical once the watermark is embedded into the original image.
The main application of watermarking is for proving ownership of the data and for protection against forgers. It is therefore crucial to ensure that no malicious attacker is able to remove the watermark without damaging the image to the degree that it becomes useless. In addition watermarking techniques need to be robust to standard operations performed on images, like printing, scanning, lossy compression (e.g., JPEG), filtering, and so on.
Hence, the tradeoffs to be considered in the design of a watermarking technique rely on three principal parameters: robustness to attacks and image processing operations, high quality, and the relative amount of secret information to be embedded, i.e., the coding rate.
Prior art image watermarking techniques can be divided into two groups according to the type of feature set the watermark is embedded in. Specifically, the watermark is embedded into either the intensity value of the luminance in the spatial domain representation of the image or the transform coefficients in the transform domain representation (e.g. DCT, DWT) of the image. The algorithms that are used to detect the watermark signal can also be placed under two categories based on whether or not they use the original image during the watermark detection process. In general, watermarking techniques that embed the watermark in the coefficients of a transform domain and detect it without resorting to the original image enjoy many advantages in their robustness to standard image processing operations and to hostile attacks.
The basic technique for embedding a watermark message or data into an image I by encoding the watermark data within the transform domain is performed by initially transforming the image I to obtain a representation in a transform domain (e.g. DCT, DFT etc) of the image. Next, a sub-set of the transform coefficients is selected and the watermark message is encoded by slightly changing the sub-set of transform coefficients values, thus producing a watermarked transform coefficient set. The watermarked coefficients are then combined with the non-watermarked coefficients to generate a watermark embedded transform representation of the image. The watermarked transform representation is then inverse-transformed to produce a watermarked image Ĩ. The coefficient modification is subtle enough so that Ĩ is perceptually indistinguishable from the original image I.
In order to recapture the watermark from the watermarked image Ĩ a decoder receives the distorted or noisy version of Ĩ, that may have suffered certain image processing operations or hostile attacks. It transforms the received version to the appropriate transform domain representation and selects the same sub-set of coefficients in which the watermark signal has been encoded. The decoder then extracts the watermark message from the sub-set of coefficients using a decoding procedure.
Recently, two methods for watermarking in a transform domain have been suggested for decoding without resorting to the original image: coefficient perturbation and dithering modulation.
In one prior art method using coefficient perturbation, the watermark data is added to the original image by perturbing the values of significant DCT (i.e., transform) coefficients. For example, if s is a DCT coefficient, a “zero” bit of the watermark data is encoded by changing the coefficient to s+&egr; and a “one” bit of the watermark data is encoded by changing the coefficient to s−&egr;, where &egr; is a small constant. Recapturing the watermark message from the watermarked image Ĩ is accomplished by correlating the appropriate DCT coefficients with the watermark message. Variations of this watermarking technique have been suggested such as the use of different transform domains such as DFT or DWT and/or the use of different perturbation schemes (e.g., s(1±&egr;) or s±&egr;|s|).
Dithering modulation is based on quantizing the transform domain coefficients. In this case, embedding a watermark message in a selected sub-set of coefficients is based on replacing these coefficients with their quantized values in a way that depends on the watermark message. For example, a “zero” bit is encoded by quantizing the coefficients with a quantizer q
0
and a “one” bit is encoded by quantizing the coefficients with a different quantizer q
1
.
In a variation of the dither modulation watermarking scheme “zero” bit and “one” bit values are encoded using two “self-noise suppression” mappings f
0
and f
1
which are based on a small modification of the quatizer mappings q
0
and q
1
used in the dither modulation scheme.
To date, the prior art watermarking schemes including coefficient perturbation and dither modulation are not explicitly designed to adapt to a predefined distortion level or noise criteria. As a result, they provide a relatively low rate of information embedding or suffer from high error rate under changing noise conditions. More importantly, since attempts by malicious attackers take the form of unknown noise conditions on the watermark embedded image data, these prior art schemes are less able to protect against attacks upon the security of the data—one of the main purposes of watermarking.
The present invention presents a watermarking technique which is based on a new encoding scheme referred to as scaled bin encoding which encodes watermark data into image data by modifying image values in a way that preserves high image quality (i.e., low distortion levels) and adapts to expected (i.e., worse case) noise level. Recapturing of the watermark data from the watermark embedded image after it has been exposed to unintentional and/or intentional noise is performed via a decoding method using a probability based procedure (e.g., maximum likelihood decoding), based on estimated statistics of the original image values and an expected statistical model of the noise introduced to the image by image processing operations or attack noise, thereby providing a robust and high quality watermarking system and method.
SUMMARY OF THE INVENTION
The present invention provides a method and system of embedding digital watermark data into digital image data and recapturing the embedded watermark from the watermarked digital data without the use of the original digital image data and despite noise introduced into the watermarked digital image data. The system and method of the present invention is performed by two processes: the process of embedding the watermark into the original digital data to obtain watermarked digital data and the process of decoding the watermarked digital data to obtain the original watermarked data. Watermark data is embedded into the digital image data using an encoding method referred to as scaled bin encoding. The embedded watermark data is recaptured from the watermarked data usi
Levy Avraham
Merhav Neri
Boudreau Leo
Hewlett--Packard Development Company, L.P.
Patel Shefali
LandOfFree
Method and system of watermarking digital data using scaled... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system of watermarking digital data using scaled..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system of watermarking digital data using scaled... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3254024