10.1007@978 3 319 23950 77 PDF
10.1007@978 3 319 23950 77 PDF
10.1007@978 3 319 23950 77 PDF
Digital Watermarking
Advances in the development of digital data and the Internet have resulted in
changes in the modern way of communication. A digital multimedia content, as
opposed to an analog one, does not lose quality due to multiple copying processes.
However, this advantage of digital media is also their major disadvantage in terms
of copyright and the unauthorized use of data.
Cryptographic methods and digital watermarking techniques have been intro-
duced in order to protect the digital multimedia content. Cryptography is used to
protect the content during transmission from sender to recipient. On the other hand,
digital watermarking techniques embed permanent information into a multimedia
content. The digital signal embedded in the multimedia data is called digital
watermark. A watermarking procedure can be used for the following purposes:
ownership protection, protection and proof of copyrights, data authenticity protec-
tion, tracking of digital copies, copy and access controls.
The general scheme of watermarking is shown in Fig. 7.1. In general, a
watermarking procedure consists of watermark embedding and watermark detec-
tion. Although the low watermark strength is preferable in order to meet the
imperceptibility requirement, one must ensure that such a watermark is detectable,
as well. This can be achieved by using an appropriate watermark detector.
Watermark embedding can be based on additive or multiplicative procedures. In
multiplicative procedures, the watermark is multiplied by the original content.
Watermark detection can be blind (without using the original content) or
non-blind (in the presence of the original content).
processing techniques (e.g., compression), while it is fragile under any other attack.
However, the most commonly used techniques are based on the robust
watermarking and are considered in the next sections.
Robust techniques involve embedding a watermark in the original signal, such
that the watermark removal causes serious degradation of the signal quality.
Watermark should be designed to be robust to the standard signal processing
approaches (compression, filtering, etc.), as well as to intentional attempts to
remove the watermark.
Classification in terms of the embedding domain
Watermarking techniques are further divided by the domains in which the water-
mark is embedded. Namely, the watermark can be embedded directly in the signal
domain, or in one of the transform domains. The choice of the watermarking
domain depends on the type of multimedia data and the watermarking application.
The most frequently used transform domains are based on the DFT, DCT, and DWT
transforms. The transform domain watermarking is more convenient for modeling
the spectral characteristics of watermark according to the human perceptual model.
For highly nonstationary signals, the modeling can be achieved by using time-
frequency transforms.
the loss of the watermark information are simply called attacks. Some of the
common examples are compression algorithms, filtering, change of the data format,
noise, cropping signal samples, resampling, etc. The list of commonly present
attacks for audio signals and images is given in Table 7.1.
Perceptual transparency is one of the most important requirements. Watermark
should be adapted to the host content, and should not introduce any perceptible
artifacts or signal quality degradations. However, the imperceptibility is usually
confronted with the watermark robustness requirement. In order to be imperceptible,
the watermark strength should be low, which directly affects its robustness. Hence,
an efficient watermarking procedure should always provide a trade-off between the
imperceptibility and robustness. In order to perform the watermark embedding just
below the threshold of perception, various masking procedures can be employed.
In some applications it is desirable that the watermark convey a significant number
of bits, which will be extracted by detector. Hence, it is sometimes required that the
watermark data rate (payload) is high. The property that describes the ability to embed a
certain amount of information is known as a capacity of the watermarking algorithm.
Besides the general watermarking requirements discussed above, there could be
some specific requirements, as well, related to the following issues:
– Real-time implementation,
– Complete extraction/reconstruction of the watermark at the decoder,
– The absence of the original data during the watermark extraction (blind
extraction), etc.
I w ¼ I þ αw; ð7:1Þ
I w ¼ I þ αwI: ð7:3Þ
In order to provide that the watermark does not depend on the sign of selected
watermarking coefficients, a modified version of Eq. (7.3) can be used:
I w ¼ I þ αwjI j: ð7:4Þ
Fig. 7.3 (a) The DFT of “Baboon” image, (b) The DCT of “Baboon” image
354 7 Digital Watermarking
Fig. 7.4 (a) Original “Lena” image, (b) watermarked “Lena” image
where I(i) denotes a DCT coefficient of an image. The watermark w can be created
as a pseudo-random sequence. The inverse DCT is then applied to obtain the
watermarked image. The original and watermarked “Lena” images are shown in
Fig. 7.4 (peak signal to noise ratio PSNR ¼ 47 dB).
The goal of each algorithm for watermark detection is to provide a reliable proof of
the watermark presence within the signal. Denote by Ix a set of coefficients on
which the watermark detection is performed (Ix can be either Iw or I depending
whether the watermark is present or not), and the watermark is w. A general
7.4 Watermark Detection 355
where R1 and R0 are regions in which the assumptions H1 and H0 are tested. In order
ratio lis defined
to minimize error during detection, a likelihood by using the
conditional probability density functions p I x H 1 and p I x H0 :
p I x H 1
lðI x Þ ¼ : ð7:7Þ
p Ix H0
The minimum probability of error will be achieved when the region R1 is deter-
mined as:
p0 P01
R1 ¼ I x : lðI x Þ > ; ð7:8Þ
p1 P10
p0 P01
λ¼ : ð7:10Þ
p1 P10
356 7 Digital Watermarking
The threshold λ can be set to minimize the total probability of error that occurs
during detection:
Pe ¼ p0 P f þ p1 ð1 Pd Þ; ð7:11Þ
where Pf is the probability that the watermark is detected, when in fact it is not
present (false alarm), and (1 Pd) is the probability of watermark misdetection.
The error minimization procedure is commonly performed under the assumption
that P01 ¼ P10 and p0 ¼ p1, or in other words for λ ¼ 1. It means that the probabil-
ities of false alarm Pf and misdetection Pm ¼ (1 Pd) are the same.
In practice, we usually have a predefined maximum false alarm probability from
which the threshold λ is calculated as follows:
ð
1
p lH0 dl ¼ P f ; ð7:12Þ
λ
where p lH 0 is the pdf of l under H0. After the threshold λ is determined, the
probability of misdetection is calculated as:
ðλ
Pm ¼ p lH1 dl: ð7:13Þ
1
Let us consider the procedure to minimize the detection error in the case of additive
white Gaussian noise (AWGN) model, which is the simplest one encountered in
practice. This model assumes that the coefficients are uncorrelated and have a
Gaussian distribution. Note that the watermark is considered as a noisy signal:
I x ¼ I þ w þ n; ð7:14Þ
where Ix, I and w are the coefficients of the watermarked content, the original
content and the watermark, respectively. The watermarked content can be modified
in the presence of attack, which is modeled by noise n (white Gaussian noise).
Under the assumption that the original coefficients, as well as the noise coefficients,
are uncorrelated and follow the Gaussian distribution, Eq. (7.14) can be written as
follows:
I x ¼ I n þ w: ð7:15Þ
In also has the Gaussian distribution with the modified mean value and the variance
compared to the original content I. Now, the previously defined hypothesis can be
written as:
7.4 Watermark Detection 357
H0 : Ix ¼ In
H 1 : I x ¼ I n þ w:
p I x H 1
In order to minimize the similarity measure lðI x Þ ¼ ; it is necessary to know
p Ix H0
the conditional probability density function, which in the case of the Gaussian
distribution is defined as:
Y
2
M ðI x ðiÞμx wðiÞÞ
1
p I x H 1 ¼ pffiffiffiffiffiffiffiffiffiffie 2σ 2x
2πσ 2
i¼1 x
ð7:16Þ
Y M
1
ðI x ðiÞμx Þ2
p Ix H0 ¼ pffiffiffiffiffiffiffiffiffiffie 2σ 2x ;
2πσ x 2
i¼1
where μx is the mean value of signal coefficients used in watermark detection, while
M is the length of watermark. Now the measure of similarity is calculated as:
YM ðI ðiÞμx wðiÞÞ2
x
e 2σ 2
x
p I x H 1
lðI x Þ ¼ ¼ M
i¼1
: ð7:17Þ
p Ix H0 Y ðIx ðiÞμ2 x Þ2
e 2σ x
i¼1
X n
1 h 2 2
i
‘ðI x Þ ¼ ð I x ð i Þ μ x Þ ð I x ð iÞ μ x w ð iÞ Þ
2σ 2
i¼1 " x # ð7:18Þ
1 X n Xn X n
¼ 2 2I x ðiÞwðiÞ 2μx wðiÞ w ði Þ ;
2
2σ x i¼1 i¼1 i¼1
where ‘(Ix) indicates the natural logarithm function of l(Ix). Note that the last two
terms within the brackets do not depend on Ix. Therefore, the term representing
linear correlation of Ix and w is used as a watermark detector:
X
M
D¼ I x ðiÞwðiÞ; ð7:19Þ
i¼1
which is optimal under the considered assumptions and is called the standard
correlator. In the case when the signal statistics is not distributed according to the
Gaussian distribution, other detector forms can be used.
358 7 Digital Watermarking
Fig. 7.5 Illustration of the errors that may occur in watermark detection
ð
1
p DH0 dD ¼ P f ; ð7:20Þ
Tp
where p DH0 is the pdf of detector responses D under H0. The pdf of D under H0
and H1 are illustrated in Fig. 7.5. If the response of the detector is D < Tp, we
conclude that the watermark is not present, and vice versa. In the case of equal
probabilities Pf ¼ 1 Pd, the optimum threshold is A/2 (Fig. 7.5).
In order to determine the threshold and the probability of error, we need to know
how the watermark is embedded, the statistical characteristics of the image coeffi-
cients, as well as the characteristics of attacks.
According to the signal detection theory, it is difficult to define a general test that
maximizes the signal detection probability. Also, it is known that for detection of
weak signals a locally optimal detector can be created (in our case a watermark
signal is weak in comparison to the host signal). It is defined as follows:
D ¼ gLO ðI x Þ w; ð7:21Þ
p0 ð I x Þ
gLO ðI x Þ ¼ ; ð7:22Þ
pðI x Þ
with p(Ix) and p0 (Ix) indicating the coefficients probability density function and its
derivative, respectively. Note that, the detector contains the nonlinear part gLO,
which is correlated with the watermark signal. If the coefficients have the Gaussian
distribution, the proposed detector corresponds to the standard correlator.
7.4 Watermark Detection 359
The coefficients distribution for most images can be modeled by the Gaussian,
Laplace, generalized Gaussian or Cauchy distribution functions. For example,
recall that the generalized Gaussian function can be defined as:
αβ ðβjxμjÞα 1 Γð3=αÞ 1=2
GGF ¼ e , α > 0, β ¼ : ð7:23Þ
2Γð1=αÞ σ Γð1=αÞ
For α ¼ 1, this function is equal to the Laplace distribution, and for α ¼ 2 it is equal
to the Gaussian distribution. Figure 7.6 shows the coefficients distribution of an
image. The form of the detector, which corresponds to the generalized Gaussian
distribution, is given by:
X
M
D1 ¼ signðI x ðiÞÞjI x ðiÞjα1 wðiÞ; ð7:24Þ
i¼1
γ
while the detector form for Cauchy distribution, CF ¼ π , is equal to:
ðγ2 þðxδÞ2 Þ
X
M
2ðI x ðiÞ δÞ
D2 ¼ wðiÞ: ð7:25Þ
i¼1 ðI x ði Þ δ Þ2 þ γ 2
Note that x (in the pdf) corresponds to the watermarked coefficients Ix in the
detector form (M is the length of watermarked sequence and watermark). It is
important to emphasize that the locally optimum detector form can be quite
sensitive to the pdf variations.
A simple measure of detection quality can be defined as:
Dwr Dww
R ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ffi; ð7:26Þ
σ wr 2 þ σ ww 2
where D and σ are mean values and standard deviations of detector responses, while
the indices wr and ww are used for right keys (watermarks) and wrong keys (wrong
trials), respectively. The wrong trial is any sequence which is not the watermark,
but is generated in the same way.
In order to determine the similarity between the original watermark w and the
watermark w* extracted from the protected data at the detection side, we can use the
similarity measure defined as follows:
w w∗
Simðw, w∗ Þ ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffi : ð7:27Þ
w w∗
The similarity measure is usually given in the form of the correlation coefficient,
which can be calculated as:
X
M
wðiÞw* ðiÞ
i¼1
ρðw, w*Þ ¼ sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ; ð7:28Þ
X M X M 2
ðwðiÞÞ2 w* ðiÞ
i¼1 i¼1
Audio watermarking procedures are mainly based on the specific audio signal
characteristics and psychoacoustics. In the next subsections, a brief description of
audio watermarking approaches such as the spread-spectrum audio watermarking,
two-sets method and echo embedding, is provided.
7.5 Examples of Watermarking Procedures 361
This blind audio watermarking procedure is based on the two sets A and B of audio
samples. A value d (watermark) is added to the samples within the set A, while it is
subtracted from the samples in B:
a*i ¼ ai þ d, b*i ¼ bi d;
*
and b are mean values of samples ai and bi . This method is based on the
assumption that the mean values of the samples from different signal blocks are
the same, i.e., that E a b ¼ 0 holds (which may not be always the case in the
practice). Only in this case, the watermark can be detected as:
h i
*
E a* b ¼ E ða þ dÞ b d ¼ E a b þ 2d ¼ 2d: ð7:30Þ
where d represents a certain delay of the echo signal. The extraction of the
embedded echo requires the detection of delay d. The signal copy is usually delayed
for approximately 1 ms. The echo amplitude is significantly lower than the original
signal amplitude, and hence, the signal quality is not degraded. On the contrary, the
sound is enriched. There is also a variant of this procedure, where two delays are
considered: one is related to the logical value “1”, while the other is related to “0”.
The double echo embedding operation can be written as:
where the difference between delays corresponding to “1” and “0” is denoted by Δ,
and its value does not exceed four samples. The delay detection is done by using the
cepstrum autocorrelation, which is the inverse Fourier transform of the -
log-magnitude spectrum. The complexity of cepstrum calculation is one of the
main disadvantages of this method.
Unlike the previous procedure, where the block-based DCT is performed, here we
use the 2D DCT transform of the entire image. The procedure is described in the
sequel.
(a) The selection of coefficients for watermark embedding is done through the
following steps:
1. The color channels are separated (e.g., R, G, B), Fig. 7.8.
2. 2D DCT is computed for each color matrix
3. The matrices of DCT coefficients are transformed into vectors and sorting
operation is performed
4. The largest L coefficients are omitted and the next M coefficients are
selected for watermarking.
(b) Watermark embedding
Let us denote the sorted DCT coefficients by I, while w is the watermark
created as a pseudo-random sequence. The watermarked DCT coefficients are
calculated as:
I w ðiÞ ¼ I ðiÞ þ α I ðiÞ wðiÞ, i ¼ L þ 1, . . . , M þ L;
Fig. 7.8 Color image “Lena” and the separated color channels
The time-frequency based watermarking can be used for different types of multime-
dia data: audio signals, images and video signals. The time-frequency domain can be
efficient regarding the watermark imperceptibility and robustness. Namely, the
watermark with specific time-frequency characteristics can be designed and adapted
to the host signal components, which enhances the efficiency of the watermarking
procedure. Note that the time-frequency representations defined for one-dimensional
signals can be extended to two-dimensional case in order to be applied to images. In
this case, they are usually referred as the space/spatial-frequency representations.
1. The watermark can be created with specific space/spatial-frequency character-
istics, while its embedding can be done even in the space domain. This approach
is among the first space/spatial-frequency based image watermarking proce-
dures. Namely, a two dimensional chirp signal is used as watermark:
W ðx; yÞ ¼ 2A cos ax2 þ by2 ¼ A e jðax þby Þ þ e jðax þby Þ :
2 2 2 2
ð7:33Þ
7.5 Examples of Watermarking Procedures 365
Different values of parameters av, bv, and cv define a set of projection planes.
The additional term cvxy is used to detect some geometrical transformations, as
well. In order to make a decision about the watermark presence within the
image, the maxima of the Radon–Wigner distribution are calculated:
Mðav ; bv ; cv Þ ¼ max P ωx ; ω y ; W v ; ð7:37Þ
ωx , ω y
where mi(n) is the watermark before spreading, pi(n) is the spreading code or the
pseudo-noise sequence (bipolar sequence taking the values þ1 and 1 with
equal probabilities), while ω0 is the time-varying carrier frequency which
represents the instantaneous mean frequency of the signal. The parameter a(n)
controls the watermark strength. The masking properties of the human auditory
system are used to shape an imperceptible watermark. The pseudo-noise
sequence is low-pass filtered according to the signal characteristics. Two differ-
ent scenarios of masking have been considered. The tone- or noise-like charac-
teristics are determined by using the entropy:
X
ωmax
H¼ Pðxi Þlog2 Pðxi Þ: ð7:39Þ
i¼1
The probability of energy for each frequency (within a window used for the
spectrogram calculation) is denoted by P(xi), while ωmax is the maximum
frequency. A half of the maximum entropy Hmax ¼ log2ωmax is taken as a
threshold between noise-like and tone-like characteristics. If the entropy is
lower than Hmax, it is considered as a tone-like, otherwise it is a noise-like
characteristic.
The time-varying carrier frequency is obtained as the instantaneous mean
frequency of the host signal, calculated by:
X
ωmax
ωTFDðn; ωÞ
ω¼0
ωi ð n Þ ¼ : ð7:40Þ
X
ωmax
TFDðn; ωÞ
ω¼0
The instantaneous mean frequency is computed over each time window of the
STFT, and the TFD(n,ω) is the energy of the signal at a given time and
frequency.
7.5 Examples of Watermarking Procedures 367
where STFTp stands for the short-time Fourier transform of p. The watermark
embedding is done according to:
where Iw, I and w are related to the watermarked signal, original signal and
watermark, respectively.
368 7 Digital Watermarking
The watermark detector can be made by using the correlation in the time-
frequency domain:
X
M
D¼ i
STFT wkey STFT Iiw : ð7:45Þ
i¼1
7.6 Examples
7.1. Consider a vector with a few image DFT coefficients chosen for watermarking.
DFT ¼ [117 120 112 145 136 115].
The watermarking procedure should be done in the following way:
(a) Sort the vector of DFT coefficients.
(b) Add a watermark given by w ¼ [3.5 2 4 5 9 7].
(c) Assume that the sequence wrong ¼ [3 2 5 7 2 4] provides the highest
response of the correlation based detector among large number of wrong
trials (wrong keys) used for testing.
(d) Prove that the watermark can be successfully detected by using the
standard correlator.
Solution:
Having in mind the results, we may conclude that the watermark detection is
successful.
7.2. Write a program in Matlab which perform the image watermarking as follows:
(a) Calculate and sort the DCT coefficients of the considered image;
7.6 Examples 369
imagewat¼idct2(DCTwat);
figure,imshow(uint8(imagewat))
DCTwat1¼dct2(imagewat);
DCTwat1¼DCTwat1(:);
x¼DCTwat1(v(N*N-1500-1500þ1:N*N-1500));
for k¼1:100
wrong¼0.5*rand(1500,1);
Det(1,k)¼sum(x.*watermark);
Det(2,k)¼sum(x.*wrong);
end
figure,
plot(1:100,Det(2,1:100),’r’,1:100,Det(1,1:100),’g’)
7.3. Consider the watermarking procedure described in the sequel. A block of the
8 8 DCT coefficients is selected. The watermark is added to the block
coefficients: I w ¼ I þ w. The watermarked image is exposed to the quantiza-
tion attack defined by the quantization matrix Q. Determine which watermark
samples will contribute to the difference between the watermarked and the
original coefficient after quantization attack.
45 20 54 81 0 0 0 0 5 4 1 3 0 0 0 0
15 77 0 11 0 0 0 0 3:5 5 0 5 0 0 0 0
21 0 0 39 0 0 0 0 3 3 2 5 0 0 0 0
27 44 52 75 0 0 0 0 0 2 0 6:5 0 0 0 0
DCT ¼ w¼
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
3 5 7 9 11 13 15 17
5 7 9 11 13 15 17 19
7 9 11 13 15 17 19 21
9 11 13 15 17 19 21 23
Q¼
11 13 15 17 19 21 23 25
13 15 17 19 21 23 25 27
15 17 19 21 23 25 27 29
17 19 21 23 25 27 29 31
Solution:
Approach I: It is possible to perform the quantization of the original and the
watermarked coefficients, to compare them and to select the coefficients that
are different after quantization.
7.6 Examples 371
15 4 8 9 0 0 0 0 17 5 8 9 0 0 0 0
3 11 0 1 0 0 0 0 4 12 0 1 0 0 0 0
3 0 0 3 0 0 0 0 3 0 0 3 0 0 0 0
3 4 4 5 0 0 0 0
DCT q ¼ DCT wq ¼ 3 4 4 5 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Hence, the positions of the selected coefficients are: (1,1), (1,2), (2,1), (2,2).
Approach II: Select the watermark samples higher than Q/2.
Qði; jÞ
jK ði; jÞQði; jÞj jwj ; ð7:46Þ
2
Qði; jÞ
jwj jK ði; jÞQði; jÞj : ð7:47Þ
2
The watermarked coefficients will not be quantized to the same value as the
original coefficients if the following condition is satisfied:
Condition 2
From Eq. (7.48) we have: jwj > Qði; jÞ=2. Combining Condition 1 and
Condition 2, we get:
Qði; jÞ Qði; jÞ
w ½jK ði; jÞj 1=2Qði; jÞ, [ , ½jK ði; jÞj 1=2Qði; jÞ ;
2 2
I 2n e j a j ;
2γ
Ix
pðI x Þ ¼ a
ð7:49Þ
1þ a
x
where parameter a defines the positions of the pdf maxima, while n controls
the pdf decay between the maximum and the origin. The parameter γ is usually
equal to 1/2, 1 or 2.
A locally optimal detector can be defined as:
p0 ð I x Þ
Dopt ¼ w; ð7:50Þ
pð I x Þ
7.6 Examples 373
where Q is the quantization matrix with high quality factor QF (i.e., a low
compression ratio).
Solution:
In order to provide robustness to the quantization defined by the matrix Q0
(quality factor QF0 ), the criterion for coefficients selection should be modified.
The watermarked coefficients will be robust after applying Q0 if they are not
rounded to zero, i.e., if the following condition is satisfied:
0
Q ði; jÞ
jK ði; jÞQði; jÞj jQði; jÞwj > : ð7:53Þ
2
374 7 Digital Watermarking
Note that the worst case is assumed in Eq. (7.53): the coefficient and the
watermark have opposite signs. Hence, we may observe that for efficient
watermark detection, the coefficients should be selected for watermarking if:
0
Q ði; jÞ
jK ði; jÞj w þ : ð7:54Þ
2Qði; jÞ
where t1 and t2 are the start and end points in the time domain, while
frequency range is ω 2 ðω1 ; ω2 Þ. According to Eq. (7.42), the time-
frequency mask can be defined as:
1 for ðt; ωÞ2D and jSMðt; ωÞj > ξ
LM ðt; ωÞ ¼ ;
0 for ðt; ωÞ=
2D or jSMðt; ωÞj < ξ
where parameter λ within the energy floor ξ can be set to 0.7. The
illustration of speech region is given in Fig. 7.11a, the corresponding
mask is shown in Fig. 7.11b, while the time-frequency representation of
the modeled watermark is shown in Fig. 7.11c. The modeled version of
the watermark is obtained by using Eq. (7.43).
7.6 Examples 375
Fig. 7.11 (a) Speech region selected for watermarking, (b) mask function, (c) time-frequency
representation of modeled watermark
X
N X
N
,j
D¼ i
SMwkey SMxiw þ SMiwkey SMix,wj ; ð7:55Þ
i¼1 i; j¼1
i6¼ j
X
N=21 X
N=21
I ðn1 þ i1 , n2 þ i2 Þwði1 ; i2 Þe j N ðk1 i1 þk2 i2 Þ :
2π
STFT ðn1 ; n2 ; k1 ; k2 Þ ¼
i1 ¼N=2 i2 ¼N=2
Solution:
Space/spatial-frequency representation can be used for classification between
the flat and busy image regions. Namely, busy image regions are preferred
in watermarking, because it is easier to provide watermark imperceptibility.
376 7 Digital Watermarking
The examples of busy and flat image regions are shown in Fig. 7.12a, b,
respectively. Note that, unlike the busy regions, the flat regions contain
small number of significant components in the space/spatial-frequency
domain, which can be used as a criterion for regions classification.
Following analogy with the procedure for speech signals, watermark can
be modeled according to the local frequency characteristics defined by the
mask L:
XX
wkey ðn1 ; n2 Þ ¼ STFT p ðn1 ; n2 ; ω1 ; ω2 ÞL n1 , n2 , ω1 , ω2 ; ð7:56Þ
ω1 ω2
References