Abstract
We propose a new digital watermarking method for the anti-counterfeit of trademarks based on complete orthogonal U system. By designing an algorithm and analyzing experimental results, we find that the proposed method is easily realizable and fights attacks like cutting, daubing, compression of JPEG and noise–adding. It is suitable for anti-counterfeit and authentication of trademark.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
With the rapid development of the Internet and the media, data hiding [1] has drawn increasing attention. People have begun to study the various “non-visible reality” technology. In principle, although classical encryption method can be used for image information hiding, but not necessarily suitable, because of the large amount of image data, and has autocorrelation, and the classic encryption method will not be considered for this, but in fact, these characteristics of the image itself can not be ignored and we can use. Further, the image information as an intuitive expression, can be used also with confusing, i.e., if some important information (voice, image, text, etc.) can be hidden in the image, but the image loss is very small, then an attacker it is possible to image the surface were fooled, even though he knew the image in the possession of some important information extraction algorithms do not know nothing.
In recent years, the rise of digital watermarking technology is one such image information hiding technology, it is mainly used in the field of copyright protection of electronic publications [2, 11, 13]. If the copyright owner of the electronic publication of certain key image with its own identity implants, then, we can extract features of the image at the appropriate time to prove their ownership of the works. This feature is what we call digital image watermark, in general, the digital watermark is mainly required for the following two
-
(1)
hidden, which is a basic requirement for digital watermarking, digital watermark embedding that image, the human eye can not identify it out directly from the image.
-
(2)
Robustness, anti-attack capability that the watermark, the watermark can still be extracted require After general transformation, filtering, image processing operations.
It also requires the digital watermark embedding the original image after the impact is not too large.
Currently, the watermark embedding method is mainly from the position of the space of the original image, color space, frequency space starting watermark embedding position, and seek representation.
Digital watermarking technology is to add an imperceptible in digital works of identity information, the algorithm proposed identity information where it is needed to validate the technology. In watermark detection, the original digital domain watermark image through the process of printing and scanning which makes the digital image watermark not only lost some information, but also introduced a number of noise, the watermark information to a large extent by the damage, It is very difficult to design of a robust watermarking algorithm. Lin has used Fourier transform has characteristics such as rotation, shear, translation studies watermarking algorithm against printing and scanning [3, 4]. Li used photoshop itself brought function were studied aspects of printed information hiding [5]. Zhang Chongxiong presents a design of portable instrument for detecting trademark with digital watermark [6]. The digital watermarking technology for trademark counterfeiting. Robustness algorithms not only to the scanning process, but also to achieve the scanning process, the double printing of good robustness.
In this paper, we analyzed the commercial trademark common situation, we proposed a algorithm based on First degree orthogonal function of U system.
2 First Degree Orthogonal Function of U System
Around 1983, Professor Qi Dongxu and Professor Feng Yuyu establish a class of complete orthogonal function system [7, 9, 10, 12]. It consists of a series of segments composed of odd polynomial, named as K degree U system. K = 0, 1, 2, ….. It is composed of both smooth functions and all levels of discontinuous function, and Walsh function is a special case of k = 0 in U system.
Following is a brief definition of the First degree orthogonal function of U system are given:
Among them, the discontinuity point at the 1/2. The average value from both sides of the function value limit. So the definition of first degree orthogonal function of U system the first eight images as shown in Fig. 1.
The linear U system has the following properties:
Standard Orthogonality
Among them: m, n = 0, 1, 2,…, i = 1, 2, 3,…, 2 m−1,
Convergence of Fourier-U
If a given function F Fourier-U series for F = \( \sum\limits_{i = 0}^{\infty } {\mathop a\nolimits_{i} \mathop U\nolimits_{i} } \), Ui is of the formula (1) in order to sort the functions, that \( \mathop U\nolimits_{i} = \mathop U\nolimits_{N}^{(K)} \), \( N = [\log_{2} i] + 1,\,k = i - \mathop 2\nolimits^{n - 1} + 1 \)
And
So
Equation (1) shows that Fourier-U Series L2 convergence and completeness. Equation (5) showed that Fourier-U series of “grouping” Uniform Convergence.
Fourier-U Series of Renewable
If the function F is a piecewise linear function, and discontinuities occur only in \( x = \frac{q}{{\mathop 2\nolimits^{r} }} \), where q and r is an integer, then F can use a limited term Fourier-U series to accurately express.
3 Commercial Trademark Counterfeiting Digital Watermarking Algorithm
Firstly, statistics orthogonal transformation matrix coefficients after the sign watermarking algorithm, which gives a U system based on digital watermarking algorithm of trademark counterfeiting.
Generate Orthogonal Matrix from First Degree Discrete U System
We generate a 32 × 32 orthogonal matrix in discrete first degree orthogonal function of U system, the interval [0, 1] is divided into 32 sub-section. Then the piecewise linear U system first 32 base discrete, unit orthogonal we can get the 32 × 32 transformation matrix.
Trademark Counterfeiting Digital Watermark Embedding Algorithm
Steps of the algorithm: first, through the scanner to scan the trademark to the computer, or select the digital trademark image already in computer, complete the import process of trademark image; U transform to digital trademark image, binding properties of the human visual masking; embedding a watermark bit to the U transformed matrix coefficients. The work is completed the watermark embedding.
Here we combine the process of embedding a specific experiment elaborated. Among them, the image size to be counterfeit trademark 256 × 512, binary watermark image size is 16 × 16 (Fig. 2).
-
(1)
The trademark image into pieces of 32 × 32, 8 × 16–128 divided into blocks of each piece separately U transformation.
-
(2)
We get the small piece’s IF {u + v = 27, 28, 29, 30, 31, 32, 33, 34, 35} (u, v is the image pixel position). Each intermediate frequency coefficient can in turn corresponds to 26, 27, 28, 29, 30, 29, 28, 27, 26 pixel position, total of 250 position, then select 6 position from 36 intermediate frequency coefficient {(16, 20) (17, 19) (18, 18) (19,17) (20, 16) (21, 15)}. A total of 256 positions were selected (for the embedded watermark 16 × 16 = 256 bits of information selected).
-
(3)
We use pixel position (1, 26) for example. Statistical sign U coefficient 128 pieces in that position when embedding. Order pos (u, v) is positive number, nega (u, v) is the number of negative. Let d for embedding strength, experiments take 126.
When embedding watermark bits to 0, if
There is no need to change the coefficient U of the position of the 128 pieces, otherwise the adjustment coefficient U. The absolute value of the smallest positive number sign negated, until compliance with the formula (7); When the embedded watermark bit is 1, if
There is no need to change the coefficient U of the position of the 128 pieces, otherwise the adjustment coefficient U. The absolute value of the smallest positive number sign negated, until compliance with the formula (8). When the 256 turn after the watermark information processing, embedding the work completed.
Watermark Extraction Algorithm
Watermarking algorithm is the inverse process of the embedding algorithm. Trademark image has been printed is scanned to obtain a digital trademark image. and to make 32 × 32 block, U transformation, get the matrix coefficients after U transformation, embedding position for each extraction, the extraction coefficient matrix when the number is greater than the number of positive negative watermark bit is 0; otherwise extract the watermark bit is 1. Complete extraction of all embedded position to obtain a complete watermark information.
4 Algorithm Analysis and Experimental Trademark Legend
Algorithm Analysis
(1) U transform the selected IF coefficients.
We have come through the coefficient matrix after U transformed by experiment. Most of the energy in the low frequency coefficients are concentrated reflection. Watermark embedding quality images in low frequency would be a greater impact, there will be a significant degradation. Two high-frequency coefficients are reflected image detail, many compression algorithms in today’s high-frequency coefficients are discarded because the embedded watermark in the high frequencies will not be able to resist compression attack. Taking these two cases, our embedding algorithm selected frequency coefficients.
(2) D embedding strength selection.
D embedding strength ranges from 0 to n, N is the small pieces of trademark image. Select the embedding strength of the appropriate D, can also according to different frequency coefficients adaptively selects the D, ensure the algorithm’s advantage (Fig. 3).
Trademarks Algorithm Simulation and Attack Renderings
Figure 4(A1)–(H1) were broken watermarked image trademark, trademark of watermarked image smear, irregular cutting, cutting quarter, JEPG .80 % and 50 % compression, 0.02 and 0.1 plus noise images.
We use the Normailized Correlation [8] as the similarity measure reference the original watermark W and extracted watermark between EW. Which is defined as
NC values closer to 1, indicating that the closer to the extracted watermark the original watermark.
We also once the watermarking algorithm based on U systems were compared with DCT-based watermarking algorithm, due to limited space, this does not give the image and image watermark extraction various attacks DCT-based watermark image. Table 1, respectively, using two algorithms to extract the watermark after N values from the test results, the use of a U watermarking algorithm based system can be achieved with the DCT watermarking algorithm is basically the same effect on, which basically can be completely extracted watermark information is not If the visual impact of the watermark, which shows that the algorithm can resist a certain degree of attack, the robustness of the algorithm is better
5 Conclusion
In this paper, digital watermarking technology, through the commercial trademark in the course of the analysis of a variety of circumstances, we propose a new class-based orthogonal functions of commercial trademark counterfeiting digital watermarking algorithm. The algorithm for trademark counterfeiting has the following characteristics: (1) algorithm is simple and easy to implement, low cost and high yield. (2) execution speed, quick watermark embedding and detection. (3) robust, resistant to breakage trademark, cropping, JPEG compression, noise and other attacks to some extent. (4) wide application areas, suitable for all types of trademarks.
References
Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)
Sapwater, E., Wood, K.: Electronic copyright protection. Photo-Electron. Imaging 37(6), 16–21 (1994)
Lin, C.Y., Chang, S.F.: Distortion modeling and invariant extraction for digital image print-scan process. In: International Symposium on Multimedia Information Processing (ISMIP 1999), Taipei, Taiwan, December 1999
Lin, C.Y.: Public watermarking surviving general scaling and cropping: an application for print-and-scan process. In: Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, October 1999
Li, Z., Fu, Z.: Printing image information implied [conference papers] (2000)
Chongxiong, Z.: Design and realization of detecting instrument for digital watermark trademark based on ARM. In: 2011 10th International Conference on Electronic Measurement and Instruments (ICEMI), vol. 3 (2011)
Dongxu, Q., Yuyu, F.: About orthogonal complete system. J. Jilin Univ. Nat. Sci. 2, 21–30 (1984)
Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8, 58–68 (1999)
Qi, D.X., Ding, W., Li, H.S.: A new image transformation scheme and digital approximation between different pictures (1999)
Qi, D.X., Ding, W., Li, H.S.: Tangram algorithm: image transformation for storing and transmitting visual secrets (1997)
Gupta, P.: Cryptography based digital image watermarking algorithm to increase security of watermark data. Int. J. Sci. Eng. Res. 3(9) (2012)
Ma, H., Song, R., Wang, X., Qi, D.: Journal of V descriptors and B spline curve [J] Computer Aided Design and Computer Graphics, 18(11) (2006)
Som, S., Mahapatra, S., Sen, S.: A no reference image authentication scheme based on digital watermark information systems design and intelligent applications. Adv. Intell. Syst. Comput. 339, 741–749 (2015)
Acknowledgement
This work is supported by National Basic Research Program of China (973 Program) under Grant no. 2011CB302400, the Science and Technology Development Fund of Macau under Grant nos. 110/2014/A3 and 084/2012/A3, and the Open Project Program of the State Key Lab of CAD & CG of Zhejiang University under Grant nos. A1513.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, C., Ye, B., Lai, J., Jia, Y., Cai, Z. (2015). A Digital Watermarking Algorithm for Trademarks Based on U System. In: Zhang, YJ. (eds) Image and Graphics. ICIG 2015. Lecture Notes in Computer Science(), vol 9217. Springer, Cham. https://doi.org/10.1007/978-3-319-21978-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-21978-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21977-6
Online ISBN: 978-3-319-21978-3
eBook Packages: Computer ScienceComputer Science (R0)