[ieee 2007 2nd international conference on pervasive computing and applications - birmingham, uk...

5
Watermarking Polygonal Lines Using V-Descriptors Xiaoyun Tie', Jiancheng Zoul, Wenqi Zhong', Dongxu Qi2 IInstitute of Image Processing and Pattern Recognition, North China University of Technology, Beijing, China tiexy@ncut. edu. cn, jianchengzou@sohu. com, qingyunzhichi@tom. com 2Macau University of Science and Technology, Macau, China dxqi@,must. edu. mo Abstract Based on the V- descriptors, a novel watermarking algorithm to protect the copyright of vector images is proposed in this paper. Watermarks are embedded in the image's contours. Experiments show that the algorithm is robust against some attacks such as translation, scaling, rotation and local revision. Keywords: Watermarking, Descriptor, information security 1. Introduction The digital information revolution has brought about profound changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. Digital products are very easy to copy, reproduce, and maliciously process in a network environment. Over the past decade, watermarking has emerged as an important technology for protecting copyright of multimedia products [1] . Current watermarking technology focuses on media types like still image, and video and audio streams. However more and more CAD -based 2D and 3D data are entering the World Wide Web, mostly as Virtual Reality Modeling Language scenes [2 5]. Many multimedia applications use vector graphics image for example, digital maps, geographic information systems (GIS) data, 2D graphics, and cartoon image. Classical watermarking methods embed a watermark by applying luminance alterations to the image. These methods are not suitable for vector graphics images because in such images watermarks are perceivable and easily removed [6 7] The most important information of vector graphics is stored in the contours. A watermarking method based on Fourier descriptors is presented in [6]. Another watermarking method based on complex wavelet is proposed in [7]. Based on the V- descriptors we propose a novel watermarking algorithm to protect the copyright of vector images in this paper. We embed watermarks in the image's contours. Experiments show that the algorithm is robust against some attacks such as translation, scaling, rotation and local revision. 2. V Systems and V Descriptors 2.1 V Systems Orthogonal transformations are powerful mathematical tools and have a lot of applications in signal processing. Orthogonal functions can be used in many fields such as signal processing, engineering computation, spectral analysis, etc. The well known orthogonal functions are Fourier triangular functions, polynomial orthogonal functions, Walsh functions, Haar functions, etc. Qi and Feng ([8- 11]) explicitly constructed a kind of complete orthogonal function system - U systems. Song and Qi [12] constructed another kind of complete orthogonal function system - V systems, composed by a series of piecewise polynomials of degree k (k = 0, 1, 2, . . ), they are called the V-system of degree k. The V-system consists of not only smooth functions, but also discontinuous functions at multi-levels. The Haar system is just a special case of the V-system with k = 0. Definition [9]: If the k + 1 functions (x), i = 1,2,., k + 1} defined on the interval [0,1] satisfies the following three properties (1)fi(x) is a piecewise polynomial of degree k with x=2 as= a knot point, and f(x) is Ck- continuous at X = , i =1,2,, kk+1; (2) < t(x), f,(x) >= o5lj jEi,j 12 ,k } (3)< f(x),xi >= Oe{1,2, k +1}, je {O,l,. ,k}. Where < ,@> denotes the inner product in L2 [0,1], then we call {fi (x) , i = 1,2, , k + 1} generator functions of degree k . It's obvious that we can deduce the generator functions of degree k from the coefficients of some [10-12] equations For example, there is only one generator function of zero degree 1-4244-0971-3/07/$25.00 ©)2007 IEEE.

Upload: dongxu

Post on 24-Mar-2017

221 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: [IEEE 2007 2nd International Conference on Pervasive Computing and Applications - Birmingham, UK (2007.07.26-2007.07.27)] 2007 2nd International Conference on Pervasive Computing and

Watermarking Polygonal Lines Using V-Descriptors

Xiaoyun Tie', Jiancheng Zoul, Wenqi Zhong', Dongxu Qi2IInstitute ofImage Processing and Pattern Recognition, North China University of Technology,

Beijing, Chinatiexy@ncut. edu. cn, jianchengzou@sohu. com, qingyunzhichi@tom. com

2Macau University ofScience and Technology, Macau, Chinadxqi@,must. edu.mo

Abstract

Based on the V- descriptors, a novel watermarkingalgorithm to protect the copyright of vector images isproposed in this paper. Watermarks are embedded inthe image's contours. Experiments show that thealgorithm is robust against some attacks such as

translation, scaling, rotation and local revision.

Keywords: Watermarking, Descriptor, informationsecurity

1. Introduction

The digital information revolution has brought aboutprofound changes in our society and our lives. Themany advantages of digital information have alsogenerated new challenges and new opportunities forinnovation. Digital products are very easy to copy,

reproduce, and maliciously process in a networkenvironment. Over the past decade, watermarking hasemerged as an important technology for protectingcopyright of multimedia products [1] . Currentwatermarking technology focuses on media types likestill image, and video and audio streams. However more

and more CAD -based 2D and 3D data are entering theWorld Wide Web, mostly as Virtual Reality ModelingLanguage scenes [2 5]. Many multimedia applicationsuse vector graphics image for example, digital maps,

geographic information systems (GIS) data, 2Dgraphics, and cartoon image. Classical watermarkingmethods embed a watermark by applying luminancealterations to the image. These methods are not suitablefor vector graphics images because in such imageswatermarks are perceivable and easily removed [6 7]

The most important information of vector graphics isstored in the contours. A watermarking method basedon Fourier descriptors is presented in [6]. Anotherwatermarking method based on complex wavelet isproposed in [7]. Based on the V- descriptors we propose

a novel watermarking algorithm to protect the copyrightof vector images in this paper. We embed watermarksin the image's contours. Experiments show that thealgorithm is robust against some attacks such as

translation, scaling, rotation and local revision.

2. V Systems and V Descriptors

2.1 V Systems

Orthogonal transformations are powerfulmathematical tools and have a lot of applications insignal processing. Orthogonal functions can be used inmany fields such as signal processing, engineeringcomputation, spectral analysis, etc.

The well known orthogonal functions are Fouriertriangular functions, polynomial orthogonal functions,Walsh functions, Haar functions, etc. Qi and Feng ([8-11]) explicitly constructed a kind of completeorthogonal function system - U systems. Song and Qi[12] constructed another kind of complete orthogonalfunction system - V systems, composed by a series ofpiecewise polynomials of degree k (k = 0, 1, 2, . . ),they are called the V-system of degree k. The V-systemconsists of not only smooth functions, but alsodiscontinuous functions at multi-levels. The Haarsystem is just a special case of the V-system with k = 0.

Definition [9]: If the k + 1 functions(x), i = 1,2,., k + 1} defined on the interval [0,1]

satisfies the following three properties

(1)fi(x) is a piecewise polynomial of degree

k with x=2as= a knot point, and f(x) is Ck-

continuous at X = , i =1,2,, kk+1;

(2)< t(x),f,(x) >= o5lj jEi,j 12 ,k }(3)< f(x),xi >= Oe{1,2, k +1},je {O,l,. ,k}.Where < ,@> denotes the inner product in L2 [0,1],

then we call {fi (x) , i = 1,2, , k + 1} generator

functions of degree k .

It's obvious that we can deduce the generatorfunctions of degree k from the coefficients of some

[10-12]equationsFor example, there is only one generator function ofzero degree

1-4244-0971-3/07/$25.00 ©)2007 IEEE.

Page 2: [IEEE 2007 2nd International Conference on Pervasive Computing and Applications - Birmingham, UK (2007.07.26-2007.07.27)] 2007 2nd International Conference on Pervasive Computing and

1, xe[Oj).f(x) = 2 9

f -1, xe (2,1]There are two generator functions of degree one:

f1 (x)= (1-4x), O.<xlbV3 (4x-3), ±<x.l.

f2 (x) ={16x,O<x< 1

2 -X<12There are three generator functions of degree two:

V-5(16X2 _IOx+l), O<x<f1(x) = ( ) 2

V5[-16(1 -x)2 + 10(1 x) 1], I< x < 1L ~~~~~~~2

FX (30x2 -14x+1), <x<f2(x)= 1 2

[30(1 x)2 -14(1 -x)+1], <x<1L ~~~~~~~2

{40X2 -16x+1,f (y) =

0<x< 12

J 3 kA -]

40(1-x) +16(1-x)+1, 2 <x<1

The function values of the above functions at thediscontinuous point take the average value of the leftand right values.

Now let V,1 (x),V,71(x), , Vk', (x) are the former

k +1 Legendre polynomials in the interval [0,1 ], thenwe can construct generators with order k .

{&,2 (X) , i = 1,2., k + 1}, which are orthogonalwith each other, and they are also orthogonalwith VA'l (x), Vk2l (x), * , (x) . Then the V- systemsofdere redfieahVfllwnof degree n are defined as the following

V2-,-2V i -2 2x 2)1'V17I(x) =k

,V' 2[2 2n(X 2 )]

O,

-1 1

2 ' 2n-2else

i=12..,k+1, Ij=1,2, ,2 325,

2.2 Piecewise Linear V- systems

The general formula of the V - System of degree oneare the following

V2 1 2 [2 (x n2j10, else

0 [4j 3-2 x) x E ( 2n-2 2 n-I

V3(2n2 n

x-4j + 1), x E (2j-1 J )

V2'n(x) e 2

22(X_2x0, else

F 22(61j5-3.2"x) XE(n

1 2] -1

2`2(6j-1 32x)3 xe(21 )

O, else

I=1,2,",2 2;n- = 3,4,***' ~~~~~~~~~~~~~~~~~~~L S _a T,~~~~~~~~~~~~~~~~~~~~~~~~~2!| | ~~~~~~~~~~~~~~~_ LI!2~~~~~~~~~~I :-,3~

Nr~Nr~

Figure 1: the former 16 base functions of V Systems o1

(11 j .n

Where~~~~~~~~N

(ii)VSytem ofdegreek arecopeeiL2[,]

(iv) FourePr-Vperties Reproduction:_IfFnisraVpiecewis

piTsefonmer-qe(qiandriearie insyteges) ithane bhe

serloies. rpetisTheLcliyk-dgresuprVssetem ,hasmuhandt

2n-2~ ~ ~ ~ v1 2

discontinuity 12,,,,inoraio. Eseial using.

reproducSytionmw candoge somre forequienyoanalysisao

geometricin formation2.VDescripto

<~~ Vkn, , k m

Vvlheredegeeon

2.3i TheSystertisofdegeewisae mLeteain Systems

The fourier-VmerisRpoution:ed ipiecewiseVsseshv h

folloingprpetis

di)sLontinity. Thesupormtiston. Eseial usins

reproduction,tem candoge ksare norequien analsisofoageometricn infoL2ation]2.4 ~ ~ <kVZ'Descriptor

Given a graph set of the planar curve

P(t) = x(t) + iy(t) with 2n pieces,where i = -1 , x(t), y(t) are piecewise

0, else

Page 3: [IEEE 2007 2nd International Conference on Pervasive Computing and Applications - Birmingham, UK (2007.07.26-2007.07.27)] 2007 2nd International Conference on Pervasive Computing and

polynomials of degree k. x(t), y(t) can be exactlyexpressed by the V- systems of degree k. By dividinguniformly the interval [0,1] into 2n subintervals, wecan map X(t), y(t) to the subintervals respectively:

X(t) = Xj (t), tE [j2,j')},j=0,1,.*.,2 1,

y(t) = {yj (t), t El [ j )} j = 0,1, .,2 1,Where xj (t), yj (t) are the polynomials of degree

over [ j2 -j)nl By the reproducibility of the V- series,

we have(k+1)2 -1 (k+1)2n1

P(t) =x(t) + iy(t) = IE (jvIt+ )jv t/=0 /=0

Where Ai$ fx(t)vj(t)dt i = fy(t)vj(t)dtj = 0 ,1,2, -, (k + 1)2 n -1I

Denote i(j) = ,x + i,%{, then A(j) is called as the

j - th descriptor ofP(t), namelyu(i =) x(t)vj (t)dt + i I y(t)vj (t)dt JIP(t)vj (t)dt

j = 0,1,2, -.., (k + 1)2n -1. (2)

then P(t) (1)21k+l=o,(j)v (t)

2.5 The Properties of V- descriptor

set d(j)= AU) , j=

Then d(j) is the j-th normalized V- descriptor

ofP(t), j = 1,2, .

Theorem ([9]): () By translation zo, scaling a and

rotation 0, the descriptor A(j) is the following

i'(j) = ae'o [A(j)+zo 9(j)]. j = 0,1,2,**

where(j) j

(ii) The normalized descriptor d(j) (j = 1,2,are invariant under translation, scaling and rotationtransformations.

3. The Watermarking Algorithm

In the following we give a watermarking embeddingalgorithm for commercial bill based on one degree Vsystem, by according to the sign of matrix coefficientafter orthogonal transform.

3.1 The flow chart of the watermarkingalgorithm

Feature po i nts0 Contour __ 2D graphextract d t

V transform

Watermark embedding

Ve s

Watrmark Random number keydescriptors + ~signals j generator

Inverse V transform

WatermarkedWaemkendntnl (, 2D graph

Figure 2 the flow chart ofwatermarking embedding

Feature Xpointsextract

I CDntourextraction

V tansform- Wate-mark

sigals

Water-nard-Extract

CalcMlatecorrelation

A Water=narked2D graph

R-ndomn numbergenerator I key

Judge if there iswatemiark or not

Figure 3 the flow chart ofwatermark detection

3.2 Watermarking Algorithm

3.2.1 Extracting the contour of the graphics image

For a given image, the contour is a closed polygonalline that consists of N vertices. By the polygonalapproximation algorithm, we can also reconstruct theimage based on the feature points of the polygonal.

3.2.2 Calculate the V- descriptors

Based on the above polygonal P(t), suppose P1 (t)be the polygonal line between two adjacent featurepoints(Xj (t), yjy (t)), (xj,l (t), yj,l (t)), j = 0,1, ..* N - I,then we can calculate the V -descriptors ofP1 (t)= xj (t) + iyj (t) according to formula (2),

where i = 1 , x(t), y(t) are piecewisepolynomials.

3.2.3 Watermark Construction and embedding

Using a pseudorandom generator, we create a bi-valued ± 1 random sequence and use it to produce awatermark. A bi-valued ± 1 random sequence has zeromean value and unit variance. By changing thecoefficients of the V- descriptors, we can embed awatermark into the polygonal.

V'(k) = V(k) ' p x W(k) (3)

Where p is a factor that determines the watermarkpower, w is the watermark signal, which is a bi-valued

Page 4: [IEEE 2007 2nd International Conference on Pervasive Computing and Applications - Birmingham, UK (2007.07.26-2007.07.27)] 2007 2nd International Conference on Pervasive Computing and

± 1 random sequence controlled by a secret key, V' isthe watermarked V-descriptors ofthe polygonal lines.

3.2.4 Watermark Detection

The correlation coefficient c between V' and Wcan be used to detect the watermark's presence.. Thedetection formula is the following:

Figure 5 watermarked polygonalwith

Figure 6 anti clock rotation

90 degree to figure 5

v = V'-v W=W-W

V*WC = IV~:7 -*-, W-~* (4)v Iw*w Figure 7 X-direction

translation to figure 5Figure 8 y-directiontranslation to figure 5

Where V and W are the mean values of V andW respectively, V' is the V- descriptor of thecandidate. According to the value ofc, we can detect ifthere is watermark or not. We can think watermark existif c is greater than a theoretical mean value. Otherwiseno watermark or watermark destroyed. In this paper wetake = 0.7.

4. Simulation Results

Experiments show that the algorithms presented hereis robust to the general geometrical transformation suchas rotation, translation, scaling and local revision.

(a) is the original image with size 128X128, (b) is thecontour polygonal of image (a), which has 41 featurepoints, (c) is the watermarked polygonal. Thewatermark is a bi-valued ± 1 random sequence that haszero mean value and unit variance.

(a) Original image (b) original polygonal (c) watermarked polygonalFigure 4

In the following we test the robustness of thewatermarking algorithm by some attacks to thewatermarked polygonal, such as translation, rotation,scaling and local revision. Figure 5 is the watermarkedcontour of the original image. Figure 6 is the image byanti clock rotation 90 degree to figure 5, figure 7 andfigure 8 are the images by X-direction and Y- directiontranslating to figure 5 respectively. Figure 9 is thescaled image by 0.75times to figure 5. Figure 10 is theimage revised 8 feature points to figure 5. Diagram 1 isthe results of robustness tests (d is 0.7) described bythe correlation. Experiments show that the algorithm isrobust against some attacks such as translation, scaling,rotation and local revision.

Figure 9 scale 0.75times Figure 10 local revisionof figure 5 to figure 5

Diagram 1 the results of robustness tests ((5 is 0.7)uge is O Vmc tle 6 piLs m aiskt 6 pls m Re 9 ScaleLct 1

chanes m.g e d > a x-direLion y-decLimn de gee O0.75txs revisn

blmltian 0.0000 0.7069 0.7034 0.7057 0.7048 0.7068 0OfO68

5. ConclusionBased on the V-descriptor we introduce a novel

watermarking algorithm in this paper. Experimentsshow that the algorithm is robust against some attackssuch as translation, scaling, rotation and local revision.So this algorithm can be used to protect the copyright ofvector images. In the future we should compare theknown watermarking algorithms with ours and find theadvantages and the disadvantages of each algorithm tospecific application backgrounds.

6. Acknowledgements

This work was supported by the Development Fundof Science and Technology of Macau (045/2006/A),National 973 program of China (2002CB312104), NSFof China (No. 10671002), NSF of Beijing (1062006),PHR(IHLB) and the grant for those retuned fromoverseas.

References

[1] Schyndel R G van, Tirkel A Z, Osborne C F. Adigital watermarking [A]. In: IEEE Proceedings ofInternational Conference on Image Processing [C].1994. 86-90.

Page 5: [IEEE 2007 2nd International Conference on Pervasive Computing and Applications - Birmingham, UK (2007.07.26-2007.07.27)] 2007 2nd International Conference on Pervasive Computing and

[2] Koch E, Zhao J. Towards robust and hidden imagecopyright labeling [A]. In: Proc. 1995 IEEE Workshopon Nonlinear Signal and Image Processing [C]. 1995.452-455.[3] Zhao J, Koch E. A digital watermarking system formultimedia copyright protection [A]. In: Proc. ACMMultimedia 96 [C]. 1996. 443-444.[4] Hartung B, Hartung F, Girod B. Digitalwatermarking of raw and compressed video [A]. In:Proc. European EOS/SPIE Symp: Advanced Imagingand Network Technologies, Society of Photo-Optical Instrumentation Engineers [C]. 1996. 205-213.[5] Boney L, Tewfik A I, Hamdy K I. Digitalwatermarks for audio signals [A]. In: Proc. OfEUSIPCO 96 [C]. 1996. 1697-1700.[6] Vassilios Solachidis, loannis Pitas. WatermarkingPolygonal Lines Using Fourier Descriptors, IEEEComputer Graphics and Applications, May-June, 2004,44-51[7] Zhang Qing, Xiang Hui, Meng Xiagxu, A Graphics

Watermarking Methods based on complex wavelet,Chinese Journal of Image and Graphics, 2005,10 (4):494-498[8] Qi Dongxu, Feng Yuyu, About the completeorthogonal functions {U}, Journal of Jilin University,(science Version), 1984,(2).21-30[9] Qi Dongxu, Feng Yuyu. On the Convergence ofFourier-U Series, Journal of University of Science andTechnology of China, Issue of Math, 1983, (5): 7-17 (inChinese)[10] Qi Dongxu, Feng Yuyu. On the OrthogonalComplete system {U}, Acta.Scientiarum Natur,Universitatis Jilinensis, 1984, (2): 21-31. (in Chinese)[11] Yuyu Feng, Dongxu Qi, A sequence of piecewiseorthogonal polynomials, SIAM J.Math, Anal, 1984,15(4): 834-844;[12] Ruixia Song, Hui Ma, Dongxu Qi., Complete thefourth international conference on Wavelet Analysisand its Applica Orthogonal V-system Its Applications,Proceedings of tions,2005, Macau.