1 Introduction
The rapid development of network technology has made the transmission of multimedia data easier. Information hiding and copyright protection have become urgent problems to be solved. Digital watermarking technology is an effective way to protect data. Invisibility and robustness are the two most important characteristics of digital watermarking systems. The watermark is embedded in some important coefficients of the image, and its robustness against attacks is good, but if the important coefficients change too much, the image will be seriously distorted. Therefore, robustness and invisibility are contradictory. Watermarking technology can be divided into spatial domain watermarking technology and transform domain watermarking technology. The spatial domain watermarking algorithm has poor robustness. The transform domain algorithm can disperse the energy of the embedded watermark signal to all pixels in the space, which is conducive to ensuring the invisibility of the watermark and strong robustness. The discrete cosine transform DCT (Discrete Cosine Transformation) algorithm is easy to implement quickly in a digital signal processor. The discrete cosine transform domain image watermark is compatible with the commonly used image compression standard JPEG and has strong robustness against compression, filtering and some other attacks. Discrete Wavelet Transformation (DWT) is a linear operation that decomposes a signal into components of different scales. It is achieved by convolving the signal with a filter of varying scales. Discrete wavelet transform is a multi-resolution analysis method that can characterize local signal features in both the time domain and the frequency domain. Wavelet decomposition decomposes the original image into a series of low-frequency components and high-frequency components. Based on the masking effect of the human sensory system, the digital watermark information can be embedded into the area of the original carrier that is not easily perceived, making the digital watermark highly invisible.
Since wavelet transform has good local time-frequency analysis and multi-resolution analysis characteristics, and discrete cosine transform has good energy-gathering effect, a digital watermarking technology based on joint transform of DWT and DCT is proposed here by combining the advantages of the two transforms.
2 Watermark Embedding Algorithm
The main idea of the watermark embedding algorithm: In order to improve the security of the watermark, chaotic encryption is performed before the watermark is embedded, and then the host image is subjected to DWT to obtain 4 sub-bands: LL, LH, HL, HH, and HL is selected as the embedding sub-band. In order to make the embedded watermark evenly distributed in the HL sub-band, the HL sub-band is divided into blocks and DCT transformed. The watermark is embedded in the intermediate frequency coefficient after DCT transformation. Here, the classic comparative intermediate frequency coefficient method is used for watermark embedding, and the embedding process is shown in Figure 1.
The algorithm steps are as follows:
(1) Perform chaotic scrambling encryption on the original watermark image. Scrambling the watermark image can enhance the security of the watermark algorithm. The watermark image is scrambled by making full use of the characteristics of the chaotic sequence, which is highly sensitive to the initial value, has strong security, and has a large key space. The chaotic sequence is generated by the Logistic mapping, and the sequence is obtained by iterating according to the Logistic mapping formula (1):
Where xn∈(0,1) and μ is the bifurcation parameter.
From the calculation of Lyapunov exponent, we know that when 3.569 9≤μ≤4, the Logistic mapping is in a chaotic state. Studies have shown that the mapping has the strongest chaotic characteristics when and only when μ=4, so μ=4 is taken when generating chaotic sequences. xn is a real-valued sequence, which is not conducive to computer processing. It is usually necessary to quantize the real-valued sequence, and quantize xn to obtain the binary sequence Xn.
Logistic sequence is sensitive to initial value. As long as the number of iterations and initial value are set, many pseudo-random sequences can be obtained. Therefore, the initial value is used as the user's key, and the chaotic sequence Xp is generated using formula (1). There are many methods for encrypting digital watermarks. Here, the watermark image W is represented as a vector form Wp, P = 1, 2, ... MxN. Wp is used as the plaintext space, and the chaotic sequence Xp is used to encrypt the watermark image to obtain the encrypted watermark image Vp:
Here + performs an XOR operation. The decryption process is the same as the encryption process, using the encrypted watermark and chaotic sequence for an XOR operation. Let x0 = 0.800 000 000 1 be the user's key, and Figure 2 is the encrypted watermark image. The chaotic sequence is extremely sensitive to the initial value, and even if the key (initial value) is slightly different, the watermark image cannot be correctly decrypted.
(2) Perform a first-level DCT transform on the host image. Obtain four sub-bands LL, LH, HL, and HH. In order to balance transparency and robustness, HL is selected as the embedded sub-band. Extract the matrix A composed of HL coefficients.
(3) The matrix A composed of HL coefficients is divided into blocks of size 8x8. The purpose of dividing into 8x8 blocks is to be compatible with the JPEG compression standard.
(4) Perform DCT transformation on the matrix after partitioning.
(5) For the coefficients of the ith block after DCT transformation, the watermark is embedded by comparing the DCT intermediate frequency coefficients. The idea of the intermediate frequency coefficient comparison method is to select two positions Bi(v1, v1) and Bi(v2, v2) from the intermediate frequency region for comparison, and the subscript i represents the ith block. 22 intermediate frequency coefficients can be embedded, as shown in Figure 3. In the figure, FL represents the low frequency part of the block, and FH represents the high frequency part. FM is the intermediate frequency region that can be selected for embedding, because embedding in the FM region can avoid image quality degradation and can provide better anti-attack capabilities. In order to obtain better anti-compression attack performance, the JPEG quantization table in Table 1 can be referred to when selecting coefficients. The two DCT coefficients selected should meet the requirement that adjusting their size will not cause serious degradation of the carrier image. Therefore, coefficients with the same brightness quantization value in the JPEG compression algorithm should be selected. From Table 1, it can be observed that the quantization values of coefficients (4, 1) and (3, 2) or (1, 2) and (3, 0) are equal, which is more suitable for comparison.
Specific implementation of the watermark embedding algorithm: For each 8x8 block, select a pair of coefficients (4, 1) and (3, 2), compare their sizes, and ensure that they satisfy equation (3). If not, swap the values of the two coefficients. ωi is the value of the information bit embedded in the i-th block.
In order to improve the robustness, the algorithm is further improved. The control amount α is introduced to expand the difference between the two DCT coefficients. Although the introduction of α will degrade the image, it can reduce the detection error.
When ωi=1, the coefficient (4, 1) is greater than the coefficient (3, 2), and the difference between the two is less than α, adjust according to formula (4):
When ωi=0, the coefficient (3, 2) is greater than the coefficient (4, 1) and the difference between the two is less than α, adjust according to formula (5):
(6) Perform IDCT transformation on the coefficients of the ith block after embedding the watermark information.
(7) Embed watermarks in other blocks according to steps (5) and (6).
(8) Perform IDWT transformation to obtain the image with watermark embedded.
3 Watermark extraction algorithm
This algorithm is a blind watermark algorithm, and the original host image of the watermark image is not needed when extracting. Extracting watermark is the inverse process of embedding. Figure 4 shows the watermark extraction process.
The steps can be described as follows:
(1) Perform DWT transformation on the watermarked image.
(2) Select the HL subband and divide it into 8x8 blocks for DCT transformation.
(3) Extract the watermark according to formula (6).
(4) Reconstruct the watermark image according to the extracted watermark bits to obtain the encrypted watermark.
(5) The watermark image is chaotically decrypted using the chaotic key to obtain the decrypted watermark.
(6) Calculate the similarity between the restored watermark signal and the original watermark signal.
4 Test results
The experiment uses a host image of size 512×512. After the first level of DWT transformation, the size of the HL subband is 256×256. The selected HL subband is divided into 8×8 blocks, resulting in 1 024 blocks. Using these blocks, a 1 024-bit watermark can be embedded into the host image. A 32×32 binary image is used as a watermark and embedded into the host image.
4.1 In the absence of an attack
Figure 5 shows the host image and watermark image used in the experiment. Figures 6a and 6b respectively describe the image after the watermark is embedded by the algorithm and the extracted watermark. In order to verify the performance of the algorithm, the algorithm is compared with the results of direct application of DCT for watermark embedding. Figure 7 shows the image and the extracted watermark after direct application of DCT for watermark embedding. It can be seen that the watermark can be correctly extracted from the watermark image, but the image after the watermark is embedded by direct application of DCT algorithm is less invisible.
Table 2 gives the PSNT and NC values of this method and the single DCT method, from which it can be seen that when not attacked, the NC of both algorithms is 1. However, the peak signal-to-noise ratio of this method is higher, reaching 36.7777 dB, so the image quality is better.
4.2 In case of attack
In order to measure the invisibility and robustness of the algorithm, some common attack experiments are conducted on the watermarked image. Including Gaussian noise, salt and pepper noise, Gaussian low-pass filter, JPEG compression, rotation and other attacks. The experimental results are shown in Table 3. When the watermarked image is attacked by 10% Gaussian noise and 10% salt and pepper noise, the NC value is still above 0.9. When the watermarked image is attacked by 50% JPEG compression, the NC value is close to 1. It can also be observed from the table that the algorithm has a strong ability to resist Gaussian low-pass filter attacks, but a poor ability to resist rotation attacks, because the spatial relationship between the original image and the watermarked image is disrupted.
5 Conclusion
A new digital image watermarking algorithm based on joint DWT-DCT transform is proposed. The host image is first transformed by DWT to extract the HL subband, and then the DCT is calculated for the selected HL subband, and the encrypted watermark is embedded into the coefficients after DCT transform. The characteristics of this algorithm are as follows: (1) The original watermark is encrypted by chaotic sequence to increase the confidentiality of the watermark; (2) The watermark is embedded in the data block after DWT-DCT transform, which has better invisibility and stronger robustness than the single transform domain technology; (3) In the embedding process, the comparison of intermediate frequency coefficients is adopted, and the JPEG compression model is referred to to improve the compression resistance of the watermark; (4) The embedding position of the watermark is selected in the intermediate frequency band of the block DCT domain after a large number of experiments, which can achieve a better balance between robustness and transparency; (5) Watermark detection does not require the original image, and blind detection is achieved. This algorithm can be used to protect the copyright of digital images and has certain practical value.
Previous article:Research on License Plate Recognition System Based on MATLAB
Next article:Design of Multi-channel HDLC Transceiver Circuit Based on FPGA
- Popular Resources
- Popular amplifiers
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- Sn-doped CuO nanostructure-based ethanol gas sensor for real-time drunk driving detection in vehicles
- Design considerations for automotive battery wiring harness
- Do you know all the various motors commonly used in automotive electronics?
- What are the functions of the Internet of Vehicles? What are the uses and benefits of the Internet of Vehicles?
- Power Inverter - A critical safety system for electric vehicles
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- DSP28027 SPI learning
- AWR1843BOOST mmw demo operation guide (Part 2)
- DHT11 temperature and humidity sensor, error File "dht.py", line 23, in measure
- Wafer Foundry
- RVB2601 drives MPU6050 gyroscope module
- Compile Linux firmware for Xunwei 3399 development board
- Compatibility Design Considerations for Mesh Topology in Wireless Mesh Networks
- It’s worth the wait, the STM32 video account and Bilibili account are now opened!
- Coaxial cable related information PDF
- 【Gizwits Gokit3 Review】+Mobile Network Configuration