A New Information Hiding Method for Image Watermarking Based on Mojette Transform

Similar documents
Difference Cordial Labeling of Graphs Obtained from Triangular Snakes

DIVIDED SQUARE DIFFERENCE CORDIAL LABELING OF SPLITTING GRAPHS

GrillCam: A Real-time Eating Action Recognition System

Guidelines on the registration of national guides to good practice. In accordance with Article 8 of Regulation (EC) No 852/2004

STABILITY IN THE SOCIAL PERCOLATION MODELS FOR TWO TO FOUR DIMENSIONS

A Note on H-Cordial Graphs

Shaping the Future: Production and Market Challenges

Thermal Hydraulic Analysis of 49-2 Swimming Pool Reactor with a. Passive Siphon Breaker

Unit of competency Content Activity. Element 1: Organise coffee workstation n/a n/a. Element 2: Select and grind coffee beans n/a n/a

RELATIVE EFFICIENCY OF ESTIMATES BASED ON PERCENTAGES OF MISSINGNESS USING THREE IMPUTATION NUMBERS IN MULTIPLE IMPUTATION ANALYSIS ABSTRACT

New Results in Various Aspects of Graph Theory

3-Total Sum Cordial Labeling on Some New Graphs

IDOT and Illinois Tollway Connecting Northern Illinois Over the Years. Clarita Lao, Illinois Tollway September 29, 2017

Learning Connectivity Networks from High-Dimensional Point Processes

TITBIT WHITEPAPER TITBIT HELPS ORBIT CAFÉ INCREASE CHECK AVERAGES BY 20% AND IMPROVE EFFICIENCY AT REDUCED COST

A Recipe Recommendation System Based on Regional Flavor Similarity Lin-rong GUO, Shi-zhong YUAN *, Xue-hui MAO and Yi-ning GU

-SQA- SCOTTISH QUALIFICATIONS AUTHORITY NATIONAL CERTIFICATE MODULE: UNIT SPECIFICATION GENERAL INFORMATION. -Module Number Session

Detecting Melamine Adulteration in Milk Powder

Optimization Model of Oil-Volume Marking with Tilted Oil Tank

Tastes and Textures Estimation of Foods Based on the Analysis of Its Ingredients List and Image

Effect of SPT Hammer Energy Efficiency in the Bearing Capacity Evaluation in Sands

Pasta Market in Italy to Market Size, Development, and Forecasts

Characterisation of macadamia nuts using X-ray microtomography

Efficient Image Search and Identification: The Making of WINE-O.AI

Tablet Waiter. An Electronic Restaurant Menu and Ordering System.

Is Fair Trade Fair? ARKANSAS C3 TEACHERS HUB. 9-12th Grade Economics Inquiry. Supporting Questions

ASSESSMENT OF NUTRIENT CONTENT IN SELECTED DAIRY PRODUCTS FOR COMPLIANCE WITH THE NUTRIENT CONTENT CLAIMS

ì<(sk$m)=beibch< +^-Ä-U-Ä-U

What, Not How? When Is How Really What?:

Instruction (Manual) Document

Abstract. Introduction

The Thrill Of The Grill : Techniques, Recipes, And Down- Home Barbecue By Chris & John Willoughly Schlesinger

Teacher s Manual. Rebecca W. Keller, PhD

Hotel. Natural Indoor Climate Minerals & Swiss Pine. 100 % Pure Swiss Pine. Concept. Swiss product

IMPROVING THE PROCEDURE FOR NUTRIENT SAMPLING IN STONE FRUIT TREES

STUDY AND IMPROVEMENT FOR SLICE SMOOTHNESS IN SLICING MACHINE OF LOTUS ROOT

ABAC. ABAC Complaints Panel Determination No: 112/11A

Fibonacci Numbers An Application Of Linear Algebra

Decolorisation of Cashew Leaves Extract by Activated Carbon in Tea Bag System for Using in Cosmetics

Coffee zone updating: contribution to the Agricultural Sector

From bean to cup and beyond: exploring ethical consumption and coffee shops

Suitability for Haul Roads (MI) Macomb County, Michigan, and Oakland County, Michigan (River Bends Park, West Side, Shelby Twp.)

Journal of Chemical and Pharmaceutical Research, 2017, 9(9): Research Article

VITICULTURE AND ENOLOGY

Algorithms. How data is processed. Popescu

The Ideation Capacity Guided by an Intercultural Experience During the Concept Designing Process, a Case Study

Principles of Preparing, Cooking and Finishing Basic Pastry Products

6.2.2 Coffee machine example in Uppaal

EFFECT OF TOMATO GENETIC VARIATION ON LYE PEELING EFFICACY TOMATO SOLUTIONS JIM AND ADAM DICK SUMMARY

Decision making with incomplete information Some new developments. Rudolf Vetschera University of Vienna. Tamkang University May 15, 2017

Meatless is a pioneer and front runner in the field of hybrid products

RUSSIAN PIPING TIPS E-BOOK

Global Sesame Oil Market Professional Survey Report 2017

Handbook for Wine Supply Balance Sheet. Wines

Fair Trade and Free Entry: Can a Disequilibrium Market Serve as a Development Tool? Online Appendix September 2014

Survey of Language Computing in Asia 2005

An introduction to Choco

STATE OF THE VITIVINICULTURE WORLD MARKET

ORLEANS GARDENS SHOPPING CENTRE 1615 ORLEANS BOULEVARD CITY OF OTTAWA, ONTARIO TRAFFIC UPDATE. Prepared for:

A New Approach for Smoothing Soil Grain Size Curve Determined by Hydrometer

This page intentionally left blank

Mixing insecticide powders with grain for storage

Computerized Models for Shelf Life Prediction of Post-Harvest Coffee Sterilized Milk Drink

Resident Student Dining Committee Minutes of Meeting

Better Punctuation Prediction with Hierarchical Phrase-Based Translation

Ceramic Composites for Microwave Grilling and Speed Cooking

The Dun & Bradstreet Asia Match Environment. AME FAQ. Warwick R Matthews

Atis (Annona Squamosa) Tea

TEST PROJECT. Server Side B. Submitted by: WorldSkills International Manuel Schaffner CH. Competition Time: 3 hours. Assessment Browser: Google Chrome

Global Perspectives Grant Program

Internet Appendix. For. Birds of a feather: Value implications of political alignment between top management and directors

Networking. Optimisation. Control. WMF Coffee Machines. Digital Solutions 2017.

Square Divisor Cordial, Cube Divisor Cordial and Vertex Odd Divisor Cordial Labeling of Graphs

Rail Haverhill Viability Study

PERFORMANCE OF HYBRID AND SYNTHETIC VARIETIES OF SUNFLOWER GROWN UNDER DIFFERENT LEVELS OF INPUT

Global Protein-Based Multiplex Assay Market Research Report 2021

longer any restriction order batching. All orders can be created in a single batch which means less work for the wine club manager.

Principles of Producing Basic Pasta Dishes

Lecture 9: Tuesday, February 10, 2015

Quotient Cordial Labeling of Graphs

Marketing Strategy and Alliances Analysis of Starbucks Corporation

Update on Wheat vs. Gluten-Free Bread Properties

Comparison of standard penetration test methods on bearing capacity of shallow foundations on sand

Independent Submission Request for Comments: April 2014 Updates: 2324 Category: Informational ISSN:

ALBINISM AND ABNORMAL DEVELOPMENT OF AVOCADO SEEDLINGS 1

Topic: Succeed in Wine Storage Management Systems Certification Scheme

Inventory of the Bern C. Ramey Papers, No online items

Proposed Maximum Residue Limit. Azoxystrobin

Big Data and the Productivity Challenge for Wine Grapes. Nick Dokoozlian Agricultural Outlook Forum February

ì<(sk$m)=bdhedf< +^-Ä-U-Ä-U

From Code to Confectionary

Algorithmic Thinking. Alison Pamment. On behalf of the course team (STFC/NERC:CEDA, NERC:NCAS, NERC:NCEO)

Divisor Cordial Graphs

Table of Contents. Toast Inc. 2

Copyright 2008, Forel Publishing Company, LLC, Woodbridge, Virginia

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a COUNCIL REGULATION

The Market Potential for Exporting Bottled Wine to Mainland China (PRC)

Design of Conical Strainer and Analysis Using FEA

Contesting the Meaning of Fair Trade Policy and Practice:

World History 3219 January 2017

Transcription:

ISBN 978-952-5726-09-1 (Print) Proceedings of the Second International Symposium on Networking and Network Security (ISNNS 10) Jinggangshan, P. R. China, 2-4, April. 2010, pp. 124-128 A New Information Hiding Method for Image Watermarking Based on Mojette Transform Cui Zhang 1, Junyu Dong 1, Jining Li 2, and Florent Autrusseau 3 1 Computer Science Department, Ocean University of China, Qingdao, China Email: zhangcui1985@163.com, dongjunyu@ouc.edu.cn 2 Weifang Public Security Bureau, Weifang, China Email: wfjjljn@163.com 3 École Polytechnique de l'université de Nantes, Nantes, France. Abstract This paper describes a new image watermarking method for which is suitable for both copyright protection and information hiding. The presented method is based upon the morphological mathematics properties of the Mojette Transform[1,2] and the Mojette Phantoms[3]. The main properties of the Mojette transform are briefly introduced and the concept of linked phantoms which depicts the null space of the operator is presented. In this paper the Mojette Phantoms can be used not only as the embeded watermark, but also can be used as the mark which is inscribed with some certain information, e.g. Chinese characters. Corresponding embedding and extractions of either the mark or the hidden message are then described. Finally, experimental results are presented in the last section. Index Terms Mojette Transform; copyright protection; Mojette Phantoms;watermarking. I. INTRODUCTION Inscribing invisible marks into an image has a variety of applications such as copyright, steganography or data integrity checking. There are many techniques can be used for watermarking, such as DCT, DWT and so on. In [3], the authors presented a method which use the Mojette Phantoms as the mark and hide the mark in the Mojette domain. However, the mark used in [3] is meaningless. In this paper we present a new method that can hide watermark which bear certain meanings. In particular, we implement the proposed method so that Chinese characters contain designed meanings can be hidden in the input image. + + M pq, f( k, l) = f( k, l) Δ ( b+ kq lp) where k= k= 1, ifb = 0 Δ ( b) =, (1) 0, ifb 0 and M I f( k, l ) is denoted as the set of I projections: M I f = { M pi, qi f; i { 1,2,... I} }. In another way, given an image and an angle, its projections are acquired by adding together the gray value of the pixels along the straight lines of m+qk-lp=x. Figure 1 shows an example. B. Inverse Mojette transform The inverse Mojette transform is the process of inverse the projections into the origin gray values of pixels. There have many ways to implement the inverse Mojette transform and we usually use the simplest one: first, select a projection which contains only one pixel; second, select the projections which contain this pixel and subtract the gray value of this pixel from these projections. Then do the above steps repeatedly until all the pixels are retrieved. This is shown in Figure 2. THE MOJETTE TRANSFORM A. Direct Mojette Transform (MT) The Mojette Transform is a kind of discrete Radon transform[4]. This transform needs many angles such asθ arc tan q =, where (p,q) are integers restricted p to PCD(p,q) = 1. For an image at each angle, we can acquire a group of projections. Every projection is called a bin. The process of the transform can be described by the following M p,q operator : Figure 1. The direct Mojette transform for a 3 3 support and 3 projections. C. Mojette phantoms The Mojette phantoms is an image which has the projections for all the given angles are zeros. The virtue of the Mojette phantoms is when adding the Mojette phantoms into an image the image s projections for the given angles will not change. Figure 3 show the properties of the Mojette phantoms. 2010 ACADEMY PUBLISHER AP-PROC-CS-10CN006 124

Figure 2. The process of the inverse Mojette transform. Figure 4. How to design the watermark. The areas we want are filled by the phantoms blocks otherwise they are filled by zero. Figure 3. the Mojette phantoms THE WATERMARKING ALGORITHM D. Watermark processing The Mojette phantoms can be embedded into the original image as the watermark. However, the original Mojette phantoms can not carry any meaningful information. In contrast we present a new method which allows the watermark composed by the Mojette phantoms to be able to hide meaningful information. The idea is to let the Mojette phantoms have a small size, and the watermark comprises multiple blocks of the Mojette phantoms. The specific process is as follow: Step 1: Design the information to be carried in the watermark. Step 2: According to the information of the watermark, we construct a watermark by the phantoms( Figure 3) and a block whose pixel gray values are all zeros. We merge the blocks of the phantoms and the zero blocks as every block is a pixel. If there is the information we fill the watermark by the phantoms blocks. Otherwise it is filled by the zreo blocks. Figure 4 shows how to design the watermark. An example is showed in figure 5. We can see meaningful information is hidden in the watermark. In this way we can hide meaningful watermark in the original image and achieve information security. For example, the information hidden in the image can be the name of the owner or the number which has a special meaning. Figure 5. A set of watermarks composed of the Mojette phantoms with meaningful information.(a).a watermark containimg two chinese characters meanimg China (b) a watermark which is an English word texture (c) a watermark which is the code of a traffic police office E. Embedding scheme For a given image and the information of the watermark, we should design the block size of the Mojette phantoms and the angles which are used to take projections. The number of the angles is denoted by I. We embed the watermark in the following steps: Step 1: For the origin image,we segment it into small blocks and denote the size of the block by n n. The purpose of this produre is to facilitate the calculation of the Mojette transform. Step 2: For each block, we take the Mojette transform at the given I angles. At every angle, all the projections can be regarded as a set of projections. So we acquire I projections. Step 3: According to the first (I-1) angles, we can create the correlative Mojette phantoms whose size is n n. We can obtain the watermark by splicing the small blocks of the Mojette phantoms and the zero blocks. Step 4: Embedding the watermark[5] in every block of the origin image. Then we can get the watermarked image. 125

Step 5: Segment the marked image into small blocks same as the origin image. Step 6: For every blocks of the marked image, we take the Mojette transform at the given Ith angles. The (I+1)th projection is acquired. Figure 6 shows the process of embed watermark. Once the embedding scheme is finished, we can transmit the projections. Figure 7. How we extract watermark Figure 6. Eembedding watermark process F. Decoding algorithm When the receiver receives the (I+1) projections, the origin image and the marked image can be retrieved according to the projections and the given angles. The first I projections are used to obtain the origin image, and the marked image is generated by the first (I-1) projections and the last projection. The specific process can be described by the following steps: Step 1: For the first I projections, take the inverse Mojette transform to obtain the original image based on the size of the block,. Step 2: For the first (I-1) projections and the last projection, take their inverse Mojette transforms to generate the marked image. Step 3: Subtract the original image from the marked image to retrieve the watermark. Figure7 shows the process of extract watermark.by comparing the extracted watermark and the original watermark, we can find whether the projections have been changed. EXPERIMENTAL RESULTS We use a set of car images and watermarks in Figure 5 as the input, and thus we can get the marked images. The watermark is composed of a number of blocks as depicted in Figure 3. The angles used to take projections are (-2,1),(1,1),(1,0) and those used to gain the phantoms are (1,1),(1,0). Figures 8,9,10 show a set of experiment results. Figure 8. (a)the original image.(b) the watermark.(c)the marked image (d)the projections of the original image at angle (-2,1).(e) the image. (j) the extracted watermark. 126

Figure 9. (a)the original image.(b) the watermark.(c)the marked image (d)the projections of the original image at angle (-2,1).(e) the image. (j) the extracted watermark Figure 10. (a)the original image.(b) the watermark.(c)the marked image (d)the projections of the original image at angle (-2,1).(e) the image. (j) the extracted watermark CONCLUSION A new watermarking method based on the mojette transform that can hide special information in the original image is presented in this paper. Experimental results show it is effective once the meaningful watermark is successfully constructed. However, it should be noted that this method might have problems if complex information is required to be hidden as efficient construction of this kind of watermark can be difficult. watermark.. ACKNOWLEDGMENT The work was supported by a grant from National Nature Science Foundations of China (No. 60702014). REFERENCES [1] N. Normand, JP. Guédon, La transformée Mojette : une représentation redondante pour l'image, Comptes rendus Académie des sciences de Paris, theoretical computer science section, p. 124-127. January 1998. [2] F. Autrusseau, J. V. Guedon, and Y. Bizais. Mojette cryptomarking scheme for medical images. Volume 5032, pages 958 965. SPIE, 2003. [3] F Autrusseau, JV Guedon Image Watermarking for Copyright Protection and Data Hiding via the Mojette Transform Proceedings of SPIE, 2002 127

[4] J. RADON. Ober die Bestimmung von Funktio-nen durch ihre Integralwerte l angs gewisser Mannigfaltigkeiten. Computed Tomography, 27, 1983. [5] F. Autrusseau, A. Saadane, D. Barba Psychovisual Approach for Watermarking", SPIE Electronic Imaging : Security and watermarking of multimedia contents, January 2001, San Jose, CA. [6] M. Kutter and F. A. P. Petitcolas, A fair benchmark for image watermarking systems, Proc. SPIE Electronic Imaging Security and watermarking of multimedia contents, San Jose, CA, Vol. 3657, p. 226-239, January 1999. [7] JP. Guédon, B. Parrein, N. Normand, Internet distributed image databases", Integrated Computer Aided Engineering, Vol.8, p. 205-214, 2001. [8] M. Katz, Questions of uniqueness and resolution in reconstruction from projections, Springer Verlag, 1977. 128