`US 6,633,653 B1
`(10) Patent No.:
`Oct. 14, 2003(45) Date of Patent:
`
`Hobsonet al.
`
`US006633653B1
`
`(54) WATERMARKED DIGITAL IMAGES
`
`(75)
`
`Inventors: Paola Marcella Hobson, Basingstoke
`(GB); Lai Hock Tay, London (GB)
`
`(73) Assignee: Motorola, Inc., Schaumburg, IL (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 09/499,048
`
`(22)
`
`Filed:
`
`Feb. 4, 2000
`
`(30)
`
`Foreign Application Priority Data
`
`“Improved robust watermarking through attack character-
`ization” by Deepa Kunduret al. Optics Express 485 1998.*
`
`“Copyright protection of digital images by embedded unper-
`ceivable marks” by Mauro Barni et al. 1998.*
`
`Fridrich J: “Robust Bit Extraction from Images”; Proceed-
`ings of the International Conference on Multimedia Com-
`puting and Systems, Jun. 1999, XP000939253, p. 536,
`right-hand column, line 35—p. 537, right-hand column,
`line 42.
`
`Kundur D. et al.: “Attach Characterization for Effective
`Watermarking”; Kobe, Japan, Oct. 24-28, 1999, Los Alami-
`tos, Ca: IEEE, US, Oct. 1999, pp. 240-244, XP000939230,
`ISBN: 0-7803-5468-0, p. 242,
`left-hand column,
`line
`9-line 22.
`
`Jun. 21, 1999
`
`(GB) eee ceeecesteeceeeretesseeereeees 9914384
`
`Int, C1. coc eccceeccsteseesessessesesneseeses G06K 9/00
`(SL)
`(52) US. Che cece eeeeereiees 382/100; 382/250
`(58) Field of Search 0...ee eeneeenee 382/100, 250
`
`Ruanaidh JJKO et al.: “Phase Watermarking of Digital
`Images” Proceedings of the International Conference on
`Image Processing (ICIP), US, New York, IEEL, Sep. 16,
`1996, pp. 239-242, XP000199952, ISBN: 0-7803-3259-8
`the whole document.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`* cited by examiner
`
`7/1999 Cox et al. wie 283/113
`5,930,369 A *
`9/2001 Wuetal. wwe. 382/100
`6,285,775 Bl
`*
`FOREIGN PATENT DOCUMENTS
`
`Primary Examiner—Jon Chang
`Assistant Examiner—Charles Kim
`(74) Attorney, Agent, or Firm—Steven R. Santema; Valerie
`M. Davis
`
`(57)
`
`ABSTRACT
`
`images includes:
`A tamper detection method for digital
`providing a digitally watermarked image; digitally process-
`ing at least some watermarked parts of the image to obtain
`confidence values; and using the confidence values to pro-
`vide an indication as to the likelihood that the image has
`been tampered with.
`
`4 Claims, 3 Drawing Sheets
`
`
`
`EP
`
`0 828 372 A2
`
`3/1998
`
`OTHER PUBLICATIONS
`
`“Secure Spread Spectrum Watermarking for Multimedia” by
`Ingemar Cox et al. NEC ResearchInstitute Technical Report
`95-10 1995.*
`“DCT-based Watermark Recovering without Resorting to
`the Uncorrupted Original Image” by A. Piva et al. IEEE
`Signal Processing Society 1997 International Conference on
`Image Processing.*
`
`
`
`
`
`Sony Exhibit 1042
`Sony Exhibit 1042
`Sony v. MZ Audio
`Sony v. MZ Audio
`
`
`
`U.S. Patent
`
`Oct. 14, 2003
`
`Sheet 1 of 3
`
`PTTt|bbeTTTTTtPtTTTeTTTTT
`
`US 6,633,653 B1
`
`FIG.
`
`2
`
`FIC.
`
`4
`
`
`
`
`U.S. Patent
`
`Oct. 14, 2003
`
`Sheet 2 of 3
`
`US 6,633,653 B1
`
`100
`
`8060 NDden
`
`CONFIDENCE 40
`(%)
`20
`0
`
`120
`
`100
`
`80
`
`60
`
`2
`mae
`ag
`
`1
`
`6
`
`11
`
`16
`
`TOT
`21 26 31 36 41 46 51
`
`WATERMARK BIT NUMBER
`
`q
`
`|
`
`| v
`
`i
`
`\
`
`6F
`
`6B
`
`6A
`
`6C
`
`20
`
`6D
`
`6E
`
`0 TTTTTT
`1
`5
`9
`13
`17
`21 25 29 33 37 41 45 49 53 57
`61
`19 23 27 31 35 39 43 47 51 55 59 63
`15
`11
`7
`3
`—— NEAN MAG. OF 36 COEFF.
`BLOCK NUMBER
`—m— CONF.
`
`VAR OF DFT (NEW)
`
`FIG.
`
`6
`
`
`
`U.S. Patent
`
`Oct. 14, 2003
`
`Sheet 3 of 3
`
`US 6,633,653 B1
`
`100
`
`90
`
`80
`
`_ 70
`Se
`
`= 50
`
`S 40
`
`30
`
`20
`
`7B
`
`—e— 4
`—N
`
`
`
`0 TTTOTTTTTTTTTTTTTp
`1,5 _9
`13.17,
`21
`25
`29
`33.
`37.
`41
`45
`49
`53
`57.
`61
`3
`7
`15
`43 47
`
`ff
`
`19
`
`23
`
`35
`31
`27
`BLOCK NUMBER
`
`39
`
`51
`
`55
`
`59
`
`63
`
`FIG.
`
`7
`
`100
`
`
`
`CONFIDENCE(%)
`
`/
`
`r
`
`=aNOWw>»WMDmNwWOwooTOo00D0D002D2DOo8TOTTTTTTTTTT
`
`A ANI
`
`,
`
`.
`
`—— CUT2
`—e— 3.2
`
`1,5 _9
`3
`7
`
`13,17.
`15
`
`1
`
`19
`
`21 25 29 33.37.
`23
`27
`31
`35
`BLOCK NUMBER
`
`39
`
`41
`53
`49
`45
`43 47°51 55
`F I G .
`8
`
`61
`
`57.
`
`59
`
`63
`
`
`
`US 6,633,653 B1
`
`1
`WATERMARKED DIGITAL IMAGES
`
`FIELD OF THE INVENTION
`
`This invention relates to watermarked digital images. In
`particular, it relates to methods for improving confidence in
`and for authentication of watermarked digital images.
`In order to increase confidence of use of digital images as
`evidence, possibly in a court of law, there is a significant
`need to demonstrate that an image has not been tampered
`with.
`
`BACKGROUND OF THE INVENTION
`
`It is knownto use audit trails, in which information about
`when an image was processed is appended to the image, but
`these methods are only applicable once an image has been
`registered onto a system. Such audit trails therefore cannot
`detect any unauthorized operationsprior to registration on a
`computer, and may not be able to report on the type of
`processing done at any one time. Audit trails can also be
`avoided or corrupted, whether deliberately or accidentally.
`Image watermarking is a known technique.
`In this
`technique, a known binary pattern or signature is embedded
`into an image at the moment of image acquisition. Such
`watermarksare called “robust” because they are designed to
`remain intact regardless of any post-processing of the image
`such as filtering, cropping etc. While such watermarks do
`provide a useful degree of protection, they can at present not
`be wholly relied on and they cannot always possess the
`required degree of surety that an image has not been
`tampered with in order for the image to be used as evidence
`under the strict rules of courts of law,etc.
`Ruanaidh, Dowling and Boland “Phase Watermarking of
`Digital Images”, IEEE INTCONEImageProcessing, Vol. 3,
`Lausanne, Switzerland, September 1996, pp 239 to 241,
`describes a technique for watermarking digital images in
`which an imageis dividedinto blocksof a selected size(e.g.
`16x16 pixels). A discrete Fourier transform (DFT) is applied
`to the luminance component of the image on a block by
`block basis. The DFT is a complex value and thereby
`generates a modulus and a phase. The resulting watermark
`comprises a binary string of 1’s and 0’s which may
`represent, for example, a company logo, a user authentica-
`tion code, date/time/location information and so on. The
`watermark is embedded in the image byaltering the phase
`of selected DFT coefficients.
`
`The present invention arose in an attempt to provide an
`improved method of authenticating, and thereby improve
`confidence in, a watermarked image.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Embodiments of the invention will now be described, by
`way of example only, with reference to the accompanying
`drawings, in which:
`FIG. 1 shows the DFT of a block forming part of an
`image;
`FIG. 2 shows phase quantization levels for forming a
`watermark;
`FIG. 3 shows a phase diagram on subsequent stage of
`verifying the watermark;
`FIG. 4 shows confidence values across part of an image;
`FIG. 5 shows variations in confidence valuc depending
`upon the bit position;
`FIG. 6 is a plot of confidence values and DFT magnitude
`variance values;
`
`10
`
`15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`FIG. 7 is a plot of confidence values for different JPEG
`compression regimes; and
`FIG. 8 showsthe effect on confidence of cutting and
`pasting part of an image.
`
`DETAILED DESCRIPTION OF EMBODIMENTS
`OF THE INVENTION
`
`According to the present invention there is provided a
`tamper detection method for digital
`images, comprising
`providing a digitally watermarked image; digitally process-
`ing at least some watermarked parts of the image to obtain
`confidence values, and using the confidence values to pro-
`vide an indication as to the likelihood that the image has
`been tampered with.
`Preferably, a discrete Fourier transform is applied to the
`image on a block by block basis, and the watermark is
`applied to each one of a selected number of DFT coefficients
`within a block by selecting the phase of that DFT coefficient
`to be equalto the phase of one or other of a plurality of phase
`values, of a set of quantized phase values, which are closest
`to the actual phase dependent upon the value with which the
`watermarked bit is to be embedded, and wherein during
`recovery of the watermark, a discrete Fourier transform is
`again taken of each block and the watermark is recovered by
`determining which of the quantized set of levels the recov-
`ered bit phase data is closestto.
`Aconfidence measure for each bit n of recovered phase P,,
`may be defined as
`
`C,=1-(2*|P,-P,|/|P,-P,))
`
`where P,, is the recovered phase for bit n of the watermark,
`|| denotes modulus, and P,, P,, are the nearest reference phase
`levels, where P,, was chosen as the closest phase level.
`Alternatively, the digital watermarking is done on blocks
`of the image of a predetermined size; wherein an amplitude
`value is added to, or from, an amplitude relating to each one
`of a numberof selected pixels of the block, depending upon
`whether the value with which the watermarkedbit is to be
`
`embedded, and wherein during recovery of the watermark,
`an estimate of the actual value is made, and wherein each
`confidence value is related to how close the recovered
`
`amplitude is to one or more of a quantized set of reference
`amplitude levels. The confidence measure C,, of each bit n
`may then be defined as
`
`Cy=1-2"|A,-An M/A.Ay))
`
`wherein An is the recovered amplitude for bit n of the
`watermark, || denotes modulus, and A,, A, are the nearest
`reference amplitude levels, where A, was chosen as the
`closest.
`The watermark is preferably a binary code(i.e., the value
`can be 0 or 1) or may be other codes, in which each bit could
`be embedded with any of three, four or more values for
`example. This coding may be useful in the spatial domain
`but can also be used in the transform domain.
`Embodiments of the invention will be described which
`use phase modulation types of image watermarking.
`However, it should be appreciated that the concepts of the
`present invention may be equally applied with other types of
`image processing, and particularly in the spatial domain in
`addition to the frequency or phase domain.
`In a method in line with that used by Ruanaidhet al, an
`imageis divided into blocks of desired size. These maybe,
`for example, 16x16 pixels. A discrete Fourier transform
`(DFT)is applied to the luminance component of the image
`
`
`
`3
`ona block by block basis. The DFT generates a modulus and
`a phase. FIG. 1 shows one 16x16 pixel block 1 forming part
`of an image 2. The watermarkis a binary string of 1’s and
`0’s which may represent possibly a company logo, a user
`Mostlegitimate processes tend to operate over the whole
`authentication code, some date/time/location information,
`of an image. Thus, if the confidence measure for bit n of the
`etc. The watermark is embeddedinto the block 1 byaltering
`watermark embedded in 16x16 block K of the image is
`the phase of selected DFT coefficients. The DFT coefficients
`measured, one would expect it to be the sameas for bit n of
`selected are shown purely schematically as X’s in some of
`the watermark embodied in any other 16x16 block of the
`the coefficients in block 1 of FIG. 1. In some embodiments,
`image. If the confidence measure C,, is the same for bit n in
`52 such elements are used (less than these are shown in the
`each block, thenit is highly unlikely that the image has been
`figure for clarity). The number 52 is chosen for minimal
`tampered with. The possibility that tampering has occurred
`visibility in the image but other numbers may be used as
`may be detected, therefore, by examining the confidence
`desired. The phase of the coefficient to be used is quantized
`measure for bit n across the whole image and in FIG. 4 the
`to one of a set of values as shown in FIG. 2. Whilst any
`confidence measure for some bits n are shown. In the figure,
`number of phase levels P,
`to P,, may be used,
`for an
`the confidence of recovery of bit n of the watermark is found
`appropriate trade off between visibility and ease of recovery,
`to be about 0.8 for most of the pixels in the image (only a
`il has been found desirable to use eight phase levels, Py to
`few have been shown), but a small area 5, which is shown
`P.. The phase of any one particular coefficient P, will be
`hatched, shows a confidence of 0.4. The user may therefore
`modified so that it takes on one of the quantized values
`{P, ... P}. In order to have a binary code, the schemeis
`suspect that an operation was performed in this area which
`chosen suchthat if the walermark bil to be embeddedis a 1,
`wasnol carried out on the rest of the picture. Examples of
`then the nearest phase from the set of even phases {P,, P,,
`such tampering which would impact confidence are cutting
`P.,, P;} is chosen to replace the value P,,. If the watermark
`and pasting where the inserted area may or maynothaveits
`bit to be embedded is a O, then the nearest set from the set
`own watermark embedded, frequency domainfiltering using
`of odd phases {P,, P;, P;, P7} is chosen to replace the value
`off-the-shelf image manipulation packages and other types
`P,.
`of processing.
`At the receiving end, in order to recover the watermark,
`Accordingly, suspicion would be thrown uponthis par-
`the DFT is taken of each 16x16 block and the phase ofthe
`ticular image and upon its authenticity.
`52 watermarked bits examined. If the recovered phase is
`An alternative method is to compute the confidence per
`closestto oneofthe set {P,, P5, P,, P<}, then a 1 is detected.
`block as an average across the whole watermark and to
`If the recovered phaseis closest to one of the set {P,, P3, Ps,
`compare this with the average confidence measure in each of
`P,}, then a 0 is detected.
`the other blocks throughout the image. A significant differ-
`After watermarking, the image may undergoaseries of
`ence in the confidence measure for a block compared with
`legitimate operations such as non-linear filtering, JPEG
`the rest of the image might indicate tampering. This varia-
`compression etc, which may alter the phase such that the
`tion tends to overcome problems which may occur with a
`phase of the received imageis no longer that determined by
`localized change to the confidence measure of onebit of the
`the quantization process of FIG. 2. The receiver must then
`watermark within a block due to random noise or other
`choose the nearest quantization level. FIG. 3 showsa bit of
`random effects.
`received phase P,,. Note that the figure only showsthree of
`It is described above how in some embodiments notall
`the quantized phase levels for clarity. Clearly, the original
`phase must have been one of P, .. . P>. Since P,, is closest
`to P,, then the bit is considered to be a 0.
`The detection method outlined with reference to FIG. 3 is
`
`10
`
`15
`
`30
`
`35
`
`40
`
`US 6,633,653 B1
`
`4
`between P, and P, (i.e. on the dashed line 4 of FIG. 3) then
`one would not know whether it should be a 1 or a 0 so the
`confidence of decision becomes0.
`
`based on the assumption that any legitimate intermediate
`processing will not alter the phase such that it goes beyond
`the point whereit could be correctly recovered. Referring to
`the figure, this implies that if the phase P,, is significantly
`altered by intermediate processing such that it falls below
`the dashed line 4 for example, then a 1 will be detected
`instead of a 0 because the phase is closer to P, than P,.
`To improve recovery of the watermark, the mark may be
`repeated in each of the 16x16 blocks of the image. Thus, for
`a QCIF image (176x144 pixels) there will be up to 99
`repeats of the watermark (in practice not all blocks are
`watermarked to reducevisibility). Thus, an average over all
`the blocks can be taken to give the recovered watermark.
`However, information within each received block can be
`used in order to provide more information about what has
`happened to that block since the image was watermarked.
`In embodiments of the invention, a confidence measure
`Cn for recovered phase Pn is defined as
`C,=1-(2*|P,-P,|P.-P,)
`where P,, is the recovered phase for bit n of the watermark,
`|| denotes modulus, and P,,, P, are the nearest reference phase
`levels, where P,, was chosen as the closest. In the example
`shownin FIG. 3, P,=P,, and P,=Po.
`Thus, if phase P,, was equal to P,, a 0 would be detected
`as the watermark bit with confidence 1. If it falls midway
`
`45
`
`50
`
`55
`
`60
`
`65
`
`blocks of the image may be watermarked. When determin-
`ing the confidence of the image, one would expect those
`areas which have been watermarked to have a higher con-
`fidence measure and therefore higher confidence level, than
`those which have not been watermarked. Thus, in a modi-
`fication and to improve security, only selected area are
`watermarked and the receiving party needs to be made
`aware which areas those are. ‘his can be done by a key
`method. Since the receiver then knows those areas of the
`
`image which are watermarked, he will expect to see higher
`confidence measures in those area. This represents an addi-
`tional level of security since a “hacker” may know that
`watermarks and confidence levels are being detected, but
`will then be unlikely to know which particular blocks he
`should concentrate on.
`It
`is possible to combine the methods of the present
`invention with a bit error rate (BER) measurement of the
`recovered watermark per block, with respect to the original
`watermark (if known), for example. By using a BER along-
`side the confidence measure, security and confidence can be
`increased. A BER can be used on its own,but fails to detect
`certain types of tampering.
`When the invention is used in the spatial domain, then
`amplitudes may be used instead of phases by addingto, or
`subtracting from the luminance value of selected pixels, an
`amplitude value (e.g. 2) depending on whether the bit is to
`be a 1 or O (ie. adding a value if it is to be 1, subtracting if
`it is to be 0). At recovery, an estimate of the original value
`is made and then a confidence measurement is made by
`
`
`
`US 6,633,653 B1
`
`5
`determining, how close the actual valueis to be either of the
`two values expected. So, if the recovered value An lies
`between expected values A, and A,but closer to A, than the
`confidence measure is defined as follows:
`
`Cy=1-2*|A,-AVIA.Ay))
`
`Note that instead of a binary code, a different code may
`be embedded as a watermark in some embodiments, both in
`the spatial and transform domains.
`It is described above how a hacker may knowthat, for
`example, 16x16 blocks are being watermarked. A further
`measure, which can be used to improvesecurity, is to change
`the origin of each block. Referring back to FIG. 1, the block
`1 has its origin, i.e. start point at pixel O,. The first block
`would then normally be the top left-most block of the image,
`for example. In an origin changing technique, the origin
`from which each block is then subsequently measured is
`offset. For example, pixel O, may be usedas the origin. This
`will offset the block by one pixel. The hacker than needs to
`know notonly the size of the blocks but also the origin point
`of each block and again this improvessecurity. Clearly, the
`information regarding the offset of the origin will need to be
`given to the receiver but this could again be done bya key
`system.
`The techniques outlined above are very efficient at
`improving the confidence in watermarked images. However,
`watermarks are often themselves distorted and/or may
`become impossible to recover when an image undergoes
`some sorts of legitimate processing such a JPEG compres-
`sion and decompression.
`The confidence measure of the present invention may be
`used to detect tampering if it is examined over each block in
`the image. In orderto do this, the confidence measure forbit
`nin a given block is compared with the measure for bit n of
`the watermarkin all other blocks of the values. Anomalous
`
`values can be evidence of tampering. However, the confi-
`dence measure itself may be subject to variation within a
`block due to the impact of JPEG processing. JPEG process-
`ing is achieved, as is known, by quantization of the DCT
`(Discrete Cosine Transform)coefficients of an image, which
`thus impact the phase. The DCT blocks in JPEG are of 8x8
`pixels and so there are four 8x8 blocks in a 16x16 block.
`JPEG quantization is not constant throughout each 8x8 pixel
`block but
`is defined according to a quantization table.
`Quantization becomesincreasingly coarse as the coefficients
`go up in frequency since the eye is less sensitive to high
`frequency components.
`An example of the impact of JPEG processing on a 52 bit
`watermark is shown in 'IG. 5 where the confidence level as
`
`a percentageis plotted against the watermark bit number.It
`is seen from the figure that the confidence measure varies
`within the watermark depending uponthe positionof the bit.
`Acyclic pattern is noted having approximately regular peaks
`and troughs whose periodicity depends on the relationship
`between the embedding pattern (and the blocksize used for
`watermarking) and the JPEG quantization which is based on
`8x8 pixel blocks.
`In modifications of the invention, a simple method to
`improve the confidence of recovery of the watermark with-
`out destroying its fragility (which is essential for tamper
`evidence) is to shuffle the embedding of the mark in each
`block. This maybe done in one embodimentby repeating the
`watermark in each block but rotated one bit at a time, as
`shown in the following Table 1.
`
`ay 0
`
`15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`TABLE1
`
`Block
`
`Start bit
`
`0
`1
`
`‘99
`
`0
`1
`
`47
`
`1
`2
`
`48
`
`2
`3
`
`49
`
`End bit
`
`51
`0
`
`46
`
`50
`51
`
`45
`
`It will be appreciated that many other methods of shuf-
`fling may be used. The watermark may be rotated by more
`than one bit at a time, it may be shuffled between blocks in
`a pseudo random manner or by many other patterns and
`schemes as will be appreciated.
`The effect of this rotation or shuffling is that the overall
`confidence of recovery of the watermark is now consistent
`on the average(i.e. taking all watermarked blocks within the
`image) for each of the 52 bits. In addition,
`the essential
`property that confidence for a given bit position within a
`16x16 block can be examined with reference to the complete
`image has been preserved and thus the watermark can be
`made more robust (that is more reliably detected) without
`affecting its tamper evident properties.
`It should be noted that the above method does not depend
`on any particular periodicity in the confidence measure with
`respect to watermark bit number as this may change if the
`watermark bits are reordered within the image block in
`which they are embedded.
`Again, the modification as shown with reference to Table
`1 is equally applicable in both spatial and transformed
`domain watermark systems. It
`is particularly applicable
`where the original image and/or original watermark maynot
`be available at the receiver when detection of the watermark
`
`takes place.
`Watermarking in itself can have a visible effect on the
`image. It is important to choose carefully those parts (ie.
`blocks) of the image which are to be watermarked. If the
`watermark is too visible, then it is easy for a hacker to
`reproduce the watermark. Accordingly,
`in order to be
`successful,
`a watermarking and confidence measuring
`scheme requires blocks to be watermarked which can have
`a high confidence measure and also low visibility.
`It is generally prudent not to watermark areas of an image
`which are of low texture.
`
`For watermarking schemes in the frequency transform
`domain in particular, but also for use in the spatial domain,
`the inventors have found that interesting information can be
`obtained by a study of the variance of the magnitude of the
`digital Fourier transform. FIG. 6 showsthree plots. A first
`plot 6a is of the confidence level for some of the blocks in
`a particular image. The confidence measurements are shown
`as squares and these are joined together to form a plot.
`Overlaid upon this is a further plot 6b which shows the
`variance of the magnitude of the DFT coefficients of each
`block. An additional plot 6c shows the mean magnitude of
`the DFT coefficients of the blocks which were selected for
`watermarking with respect to the mean magnitude ofall the
`DFTcoefficients of the block.
`The variance levels of FIG. 6b are taken as percentages
`relevant to the figure having the highest variance, which is
`considered to be 100%.
`It is seen that the highest confidence levels are generally
`obtained for those parts having lower variance (e.g. blocks
`6d, 6e, 6f). Accordingly, for the best results, it is preferable
`to choose to watermark those parts of the image which have
`a relatively low variance. In some embodimentthis maybe,
`for example, those parts of the image which have a variance
`
`
`
`US 6,633,653 B1
`
`7
`of less than about 50%. If a block has a variance of less than
`50% then this is considered to be a good candidate for
`watermarking since this block will then have lowvisibility
`and high confidence.
`It is found that patterns similar to that of FIG. 6 are
`obtained with most images.
`Table 2 below showsthe effects of watermarking three
`different images, respectively called “house”, “rose” and
`“beans”, and of watermarking those parts of the image
`which have a variance in magnitude of DFT ofless than
`50%. The overall confidence varies from 75.5 to 89.78% and
`the visibility of the watermarks is good (i.e. this meansthat
`the watermarks are not particularly visible).
`
`TABLE 2
`
`No. of
`Overall
`blocks
`w/martked BER (%)
`35
`3.81
`60
`6.99
`9
`0.31
`
`Overall
`Confidence
`(%)
`80.2
`75.5
`89.78
`
`Test
`Image
`House
`Rose
`Beans
`
`Avg. PSNR Visibility
`(dB)
`of w/mark
`83.23
`Good
`78.5
`Good
`87.5
`Good
`
`In each of the images, a total of 64 blocks were available
`to watermark and only some of these were chosen to be
`watermarked, depending upon whether they had the correct
`variance.
`Table 3 belowindicates the results of a second schemefor
`the same three images in which a block was watermarkedif
`the mean magnitude of the 36 DFT coefficients which were
`chosen for watermarking wasgreater than 40% (that is 40%
`of the total mean magnitude for the DFT block). It is seen
`that although the confidence overall is increased, the vis-
`ibility of the watermarks is not as good as for those chosen
`only whenthe variance is less than 50%.
`
`TABLE 3
`
`No. of
`Overall
`blocks
`w/martked BER (%)
`29
`0.57
`
`Overall
`Confidence
`(%)
`88.1
`
`33
`
`22
`
`3.68
`
`0.25
`
`80.1
`
`89.82
`
`Test
`Image
`House
`
`Rose
`
`Beans
`
`Avg. PSNR Visibility
`(dB)
`of w/mark
`83.16
`Notas
`Good as A
`As Good
`asA
`Notas
`Good as A
`
`84.4
`
`75.0
`
`Table 4 below indicates a scheme in which a block was
`chosen to be watermarked only if both the conditions of
`Table 2 and 3 weresatisfied, that is if the variance of the
`magnitude of the DFT was less than 50% with respect to
`peak variance and the mean magnitude of 36 coefficients
`chosen to watermark was greater than 40% ofthe total mean
`magnitude.
`
`TABLE 4
`
`No. of
`Overall
`blocks
`w/marked BER (%)
`1?
`0.49
`
`Overall
`Confidence
`(%)
`88.6
`
`30
`
`9
`
`3.85
`
`0.31
`
`81.1
`
`89.8
`
`‘Lest
`Image
`House
`
`Rose
`
`Beans
`
`Avg. PSNR Visibility
`(dB)
`of w/mark
`85.3
`As Good
`as A
`Ais
`slightly
`better
`As Good
`as A
`
`87.5
`
`79.5
`
`It is seen that the overall confidence levels are high and
`also that the visibility of the watermarks is good.
`
`8
`Note that only a small number of blocks met the require-
`ments for this table. By using origin offsetting it may be
`possible to change the origin so that more blocks are
`suitable, and thereby maximize the numberof blocks which
`have the preferred characteristics for watermarking.
`Referring back to watermarking images which are then
`subject to JPEG compression, FIG. 7 shows twoplots 7a and
`7b of varying degrees of JPEG compression. 7a shows the
`confidence in blocks which have been subject
`to a 4:1
`compression whereas block 7b shows ones which have been
`subject to an 11:1 compression. As shown, the peaks and
`troughs in the confidence measure are generally in line, but
`the greater compression tends to reduce the amplitudes of
`the peaks and troughs. Thus, confidence measures can work
`over a great variation of images and image compression
`techniques. Confidence valucs change in predictable ways
`for legitimate processing.
`FIG. 8 shows the changes in confidence level which
`occurred when an image wasdeliberately tampered with, in
`this case by cutting and pasting certain blocks and parts of
`the image. Plot 8a indicates the confidence levels per block
`and plot 8b shows which blocks were tampered with by
`cutting and pasting. A correlation is observed and the user
`can determine that the image may have been tampered and
`may therefore be unreliable as evidence.
`Whatis claimed is:
`
`1. A tamper detection method for digital images compris-
`ing:
`providing a digitally watermarked image;
`digitally processing at least some watermarked parts of
`the image to obtain confidence values; and
`using the confidence values to provide an indication as to
`the likelihood that the image has been tampered with,
`wherein the digital watermarking is made on blocks of
`the image of a predeterminedsize, a discrete Fourier
`transform (DFT)is applied to the image on a block
`by block basis to generate a plurality of DFT
`coefficients, and a watermark is applied to each one
`of a selected number of DFT coefficients within a
`
`block byselecting the phase of that DI'T coefficient
`to be equal to the phase of oneor other of a plurality
`of phase values, of a set of quantized phase values,
`which are closest
`to the actual phase, dependent
`upon the value with which the watermarkedbitis to
`be embedded, and
`wherein during recovery of the watermark, a discrete
`Fourier transform is again taken of each block and
`the watermark is recovered by determining which of
`the quantized set of levels the recovered bit phase
`data is closest to, wherein each confidence value is
`related to the proximity of the recovered phase to one
`or more of the quantized set of phase levels.
`2. The method as claimed in claim 1, wherein the water-
`mark is represented by a binary code.
`3. The method as claimed in claim 1, wherein a confi-
`dence measure for each bit n of recovered phase P,, is
`defined as
`
`C,=1-2*|P,-P,|/|Px-Py))
`where P,, is the recovered phase for bit n of the watermark,
`|| denotes modulus,and P,, P,, are the nearest reference phase
`levels, where P, was chosen asthe closest.
`4. A tamper detection method for digital images compris-
`ing:
`providing a digitally watermarked image;
`digitally processing at least some watermarked parts of
`the image to obtain confidence values; and using the
`
`10
`
`15
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`awn
`
`
`
`US 6,633,653 B1
`
`9
`confidence values to provide an indication as to the
`likelihood that the image has been tampered with,
`wherein the digital watermarking is done on blocks of
`the image of a predeterminedsize,
`wherein an amplitude value is added to, or subtracted
`from, an amplitude relating to each one of a number
`of sclected pixels of the block, depending upon
`whether the value with which the watermarkedbit is
`to be embedded, and wherein during recovery of the
`watermark, an estimate of the actual amplitude value
`is made, and wherein each confidence value is
`related to the proximity of the recovered amplitude
`
`10
`to one or more of a quantized set of reference
`amplitude levels, and
`wherein a confidence measure for each bit is of recov-
`
`ered amplitude A,, is defined as:
`
`C,=1-(2* |A,-A,|/14,-A,))
`
`is the recovered amplitude for bit n of the
`where A,,
`watermark, || denotes modules, and A,, A, are the nearest
`reference amplitude levels, where A, was chosen as the
`19 closest.
`
`