throbber
a2) United States Patent
`US 6,633,653 B1
`(10) Patent No.:
`Oct. 14, 2003(45) Date of Patent:
`
`Hobsonet al.
`
`US006633653B1
`
`(54) WATERMARKED DIGITAL IMAGES
`
`(75)
`
`Inventors: Paola Marcella Hobson, Basingstoke
`(GB); Lai Hock Tay, London (GB)
`
`(73) Assignee: Motorola, Inc., Schaumburg, IL (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 09/499,048
`
`(22)
`
`Filed:
`
`Feb. 4, 2000
`
`(30)
`
`Foreign Application Priority Data
`
`“Improved robust watermarking through attack character-
`ization” by Deepa Kunduret al. Optics Express 485 1998.*
`
`“Copyright protection of digital images by embedded unper-
`ceivable marks” by Mauro Barni et al. 1998.*
`
`Fridrich J: “Robust Bit Extraction from Images”; Proceed-
`ings of the International Conference on Multimedia Com-
`puting and Systems, Jun. 1999, XP000939253, p. 536,
`right-hand column, line 35—p. 537, right-hand column,
`line 42.
`
`Kundur D. et al.: “Attach Characterization for Effective
`Watermarking”; Kobe, Japan, Oct. 24-28, 1999, Los Alami-
`tos, Ca: IEEE, US, Oct. 1999, pp. 240-244, XP000939230,
`ISBN: 0-7803-5468-0, p. 242,
`left-hand column,
`line
`9-line 22.
`
`Jun. 21, 1999
`
`(GB) eee ceeecesteeceeeretesseeereeees 9914384
`
`Int, C1. coc eccceeccsteseesessessesesneseeses G06K 9/00
`(SL)
`(52) US. Che cece eeeeereiees 382/100; 382/250
`(58) Field of Search 0...ee eeneeenee 382/100, 250
`
`Ruanaidh JJKO et al.: “Phase Watermarking of Digital
`Images” Proceedings of the International Conference on
`Image Processing (ICIP), US, New York, IEEL, Sep. 16,
`1996, pp. 239-242, XP000199952, ISBN: 0-7803-3259-8
`the whole document.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`* cited by examiner
`
`7/1999 Cox et al. wie 283/113
`5,930,369 A *
`9/2001 Wuetal. wwe. 382/100
`6,285,775 Bl
`*
`FOREIGN PATENT DOCUMENTS
`
`Primary Examiner—Jon Chang
`Assistant Examiner—Charles Kim
`(74) Attorney, Agent, or Firm—Steven R. Santema; Valerie
`M. Davis
`
`(57)
`
`ABSTRACT
`
`images includes:
`A tamper detection method for digital
`providing a digitally watermarked image; digitally process-
`ing at least some watermarked parts of the image to obtain
`confidence values; and using the confidence values to pro-
`vide an indication as to the likelihood that the image has
`been tampered with.
`
`4 Claims, 3 Drawing Sheets
`
`
`
`EP
`
`0 828 372 A2
`
`3/1998
`
`OTHER PUBLICATIONS
`
`“Secure Spread Spectrum Watermarking for Multimedia” by
`Ingemar Cox et al. NEC ResearchInstitute Technical Report
`95-10 1995.*
`“DCT-based Watermark Recovering without Resorting to
`the Uncorrupted Original Image” by A. Piva et al. IEEE
`Signal Processing Society 1997 International Conference on
`Image Processing.*
`
`
`
`
`
`Sony Exhibit 1042
`Sony Exhibit 1042
`Sony v. MZ Audio
`Sony v. MZ Audio
`
`

`

`U.S. Patent
`
`Oct. 14, 2003
`
`Sheet 1 of 3
`
`PTTt|bbeTTTTTtPtTTTeTTTTT
`
`US 6,633,653 B1
`
`FIG.
`
`2
`
`FIC.
`
`4
`
`
`

`

`U.S. Patent
`
`Oct. 14, 2003
`
`Sheet 2 of 3
`
`US 6,633,653 B1
`
`100
`
`8060 NDden
`
`CONFIDENCE 40
`(%)
`20
`0
`
`120
`
`100
`
`80
`
`60
`
`2
`mae
`ag
`
`1
`
`6
`
`11
`
`16
`
`TOT
`21 26 31 36 41 46 51
`
`WATERMARK BIT NUMBER
`
`q
`
`|
`
`| v
`
`i
`
`\
`
`6F
`
`6B
`
`6A
`
`6C
`
`20
`
`6D
`
`6E
`
`0 TTTTTT
`1
`5
`9
`13
`17
`21 25 29 33 37 41 45 49 53 57
`61
`19 23 27 31 35 39 43 47 51 55 59 63
`15
`11
`7
`3
`—— NEAN MAG. OF 36 COEFF.
`BLOCK NUMBER
`—m— CONF.
`
`VAR OF DFT (NEW)
`
`FIG.
`
`6
`
`

`

`U.S. Patent
`
`Oct. 14, 2003
`
`Sheet 3 of 3
`
`US 6,633,653 B1
`
`100
`
`90
`
`80
`
`_ 70
`Se
`
`= 50
`
`S 40
`
`30
`
`20
`
`7B
`
`—e— 4
`—N
`
`
`
`0 TTTOTTTTTTTTTTTTTp
`1,5 _9
`13.17,
`21
`25
`29
`33.
`37.
`41
`45
`49
`53
`57.
`61
`3
`7
`15
`43 47
`
`ff
`
`19
`
`23
`
`35
`31
`27
`BLOCK NUMBER
`
`39
`
`51
`
`55
`
`59
`
`63
`
`FIG.
`
`7
`
`100
`
`
`
`CONFIDENCE(%)
`
`/
`
`r
`
`=aNOWw>»WMDmNwWOwooTOo00D0D002D2DOo8TOTTTTTTTTTT
`
`A ANI
`
`,
`
`.
`
`—— CUT2
`—e— 3.2
`
`1,5 _9
`3
`7
`
`13,17.
`15
`
`1
`
`19
`
`21 25 29 33.37.
`23
`27
`31
`35
`BLOCK NUMBER
`
`39
`
`41
`53
`49
`45
`43 47°51 55
`F I G .
`8
`
`61
`
`57.
`
`59
`
`63
`
`

`

`US 6,633,653 B1
`
`1
`WATERMARKED DIGITAL IMAGES
`
`FIELD OF THE INVENTION
`
`This invention relates to watermarked digital images. In
`particular, it relates to methods for improving confidence in
`and for authentication of watermarked digital images.
`In order to increase confidence of use of digital images as
`evidence, possibly in a court of law, there is a significant
`need to demonstrate that an image has not been tampered
`with.
`
`BACKGROUND OF THE INVENTION
`
`It is knownto use audit trails, in which information about
`when an image was processed is appended to the image, but
`these methods are only applicable once an image has been
`registered onto a system. Such audit trails therefore cannot
`detect any unauthorized operationsprior to registration on a
`computer, and may not be able to report on the type of
`processing done at any one time. Audit trails can also be
`avoided or corrupted, whether deliberately or accidentally.
`Image watermarking is a known technique.
`In this
`technique, a known binary pattern or signature is embedded
`into an image at the moment of image acquisition. Such
`watermarksare called “robust” because they are designed to
`remain intact regardless of any post-processing of the image
`such as filtering, cropping etc. While such watermarks do
`provide a useful degree of protection, they can at present not
`be wholly relied on and they cannot always possess the
`required degree of surety that an image has not been
`tampered with in order for the image to be used as evidence
`under the strict rules of courts of law,etc.
`Ruanaidh, Dowling and Boland “Phase Watermarking of
`Digital Images”, IEEE INTCONEImageProcessing, Vol. 3,
`Lausanne, Switzerland, September 1996, pp 239 to 241,
`describes a technique for watermarking digital images in
`which an imageis dividedinto blocksof a selected size(e.g.
`16x16 pixels). A discrete Fourier transform (DFT) is applied
`to the luminance component of the image on a block by
`block basis. The DFT is a complex value and thereby
`generates a modulus and a phase. The resulting watermark
`comprises a binary string of 1’s and 0’s which may
`represent, for example, a company logo, a user authentica-
`tion code, date/time/location information and so on. The
`watermark is embedded in the image byaltering the phase
`of selected DFT coefficients.
`
`The present invention arose in an attempt to provide an
`improved method of authenticating, and thereby improve
`confidence in, a watermarked image.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Embodiments of the invention will now be described, by
`way of example only, with reference to the accompanying
`drawings, in which:
`FIG. 1 shows the DFT of a block forming part of an
`image;
`FIG. 2 shows phase quantization levels for forming a
`watermark;
`FIG. 3 shows a phase diagram on subsequent stage of
`verifying the watermark;
`FIG. 4 shows confidence values across part of an image;
`FIG. 5 shows variations in confidence valuc depending
`upon the bit position;
`FIG. 6 is a plot of confidence values and DFT magnitude
`variance values;
`
`10
`
`15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`FIG. 7 is a plot of confidence values for different JPEG
`compression regimes; and
`FIG. 8 showsthe effect on confidence of cutting and
`pasting part of an image.
`
`DETAILED DESCRIPTION OF EMBODIMENTS
`OF THE INVENTION
`
`According to the present invention there is provided a
`tamper detection method for digital
`images, comprising
`providing a digitally watermarked image; digitally process-
`ing at least some watermarked parts of the image to obtain
`confidence values, and using the confidence values to pro-
`vide an indication as to the likelihood that the image has
`been tampered with.
`Preferably, a discrete Fourier transform is applied to the
`image on a block by block basis, and the watermark is
`applied to each one of a selected number of DFT coefficients
`within a block by selecting the phase of that DFT coefficient
`to be equalto the phase of one or other of a plurality of phase
`values, of a set of quantized phase values, which are closest
`to the actual phase dependent upon the value with which the
`watermarked bit is to be embedded, and wherein during
`recovery of the watermark, a discrete Fourier transform is
`again taken of each block and the watermark is recovered by
`determining which of the quantized set of levels the recov-
`ered bit phase data is closestto.
`Aconfidence measure for each bit n of recovered phase P,,
`may be defined as
`
`C,=1-(2*|P,-P,|/|P,-P,))
`
`where P,, is the recovered phase for bit n of the watermark,
`|| denotes modulus, and P,, P,, are the nearest reference phase
`levels, where P,, was chosen as the closest phase level.
`Alternatively, the digital watermarking is done on blocks
`of the image of a predetermined size; wherein an amplitude
`value is added to, or from, an amplitude relating to each one
`of a numberof selected pixels of the block, depending upon
`whether the value with which the watermarkedbit is to be
`
`embedded, and wherein during recovery of the watermark,
`an estimate of the actual value is made, and wherein each
`confidence value is related to how close the recovered
`
`amplitude is to one or more of a quantized set of reference
`amplitude levels. The confidence measure C,, of each bit n
`may then be defined as
`
`Cy=1-2"|A,-An M/A.Ay))
`
`wherein An is the recovered amplitude for bit n of the
`watermark, || denotes modulus, and A,, A, are the nearest
`reference amplitude levels, where A, was chosen as the
`closest.
`The watermark is preferably a binary code(i.e., the value
`can be 0 or 1) or may be other codes, in which each bit could
`be embedded with any of three, four or more values for
`example. This coding may be useful in the spatial domain
`but can also be used in the transform domain.
`Embodiments of the invention will be described which
`use phase modulation types of image watermarking.
`However, it should be appreciated that the concepts of the
`present invention may be equally applied with other types of
`image processing, and particularly in the spatial domain in
`addition to the frequency or phase domain.
`In a method in line with that used by Ruanaidhet al, an
`imageis divided into blocks of desired size. These maybe,
`for example, 16x16 pixels. A discrete Fourier transform
`(DFT)is applied to the luminance component of the image
`
`

`

`3
`ona block by block basis. The DFT generates a modulus and
`a phase. FIG. 1 shows one 16x16 pixel block 1 forming part
`of an image 2. The watermarkis a binary string of 1’s and
`0’s which may represent possibly a company logo, a user
`Mostlegitimate processes tend to operate over the whole
`authentication code, some date/time/location information,
`of an image. Thus, if the confidence measure for bit n of the
`etc. The watermark is embeddedinto the block 1 byaltering
`watermark embedded in 16x16 block K of the image is
`the phase of selected DFT coefficients. The DFT coefficients
`measured, one would expect it to be the sameas for bit n of
`selected are shown purely schematically as X’s in some of
`the watermark embodied in any other 16x16 block of the
`the coefficients in block 1 of FIG. 1. In some embodiments,
`image. If the confidence measure C,, is the same for bit n in
`52 such elements are used (less than these are shown in the
`each block, thenit is highly unlikely that the image has been
`figure for clarity). The number 52 is chosen for minimal
`tampered with. The possibility that tampering has occurred
`visibility in the image but other numbers may be used as
`may be detected, therefore, by examining the confidence
`desired. The phase of the coefficient to be used is quantized
`measure for bit n across the whole image and in FIG. 4 the
`to one of a set of values as shown in FIG. 2. Whilst any
`confidence measure for some bits n are shown. In the figure,
`number of phase levels P,
`to P,, may be used,
`for an
`the confidence of recovery of bit n of the watermark is found
`appropriate trade off between visibility and ease of recovery,
`to be about 0.8 for most of the pixels in the image (only a
`il has been found desirable to use eight phase levels, Py to
`few have been shown), but a small area 5, which is shown
`P.. The phase of any one particular coefficient P, will be
`hatched, shows a confidence of 0.4. The user may therefore
`modified so that it takes on one of the quantized values
`{P, ... P}. In order to have a binary code, the schemeis
`suspect that an operation was performed in this area which
`chosen suchthat if the walermark bil to be embeddedis a 1,
`wasnol carried out on the rest of the picture. Examples of
`then the nearest phase from the set of even phases {P,, P,,
`such tampering which would impact confidence are cutting
`P.,, P;} is chosen to replace the value P,,. If the watermark
`and pasting where the inserted area may or maynothaveits
`bit to be embedded is a O, then the nearest set from the set
`own watermark embedded, frequency domainfiltering using
`of odd phases {P,, P;, P;, P7} is chosen to replace the value
`off-the-shelf image manipulation packages and other types
`P,.
`of processing.
`At the receiving end, in order to recover the watermark,
`Accordingly, suspicion would be thrown uponthis par-
`the DFT is taken of each 16x16 block and the phase ofthe
`ticular image and upon its authenticity.
`52 watermarked bits examined. If the recovered phase is
`An alternative method is to compute the confidence per
`closestto oneofthe set {P,, P5, P,, P<}, then a 1 is detected.
`block as an average across the whole watermark and to
`If the recovered phaseis closest to one of the set {P,, P3, Ps,
`compare this with the average confidence measure in each of
`P,}, then a 0 is detected.
`the other blocks throughout the image. A significant differ-
`After watermarking, the image may undergoaseries of
`ence in the confidence measure for a block compared with
`legitimate operations such as non-linear filtering, JPEG
`the rest of the image might indicate tampering. This varia-
`compression etc, which may alter the phase such that the
`tion tends to overcome problems which may occur with a
`phase of the received imageis no longer that determined by
`localized change to the confidence measure of onebit of the
`the quantization process of FIG. 2. The receiver must then
`watermark within a block due to random noise or other
`choose the nearest quantization level. FIG. 3 showsa bit of
`random effects.
`received phase P,,. Note that the figure only showsthree of
`It is described above how in some embodiments notall
`the quantized phase levels for clarity. Clearly, the original
`phase must have been one of P, .. . P>. Since P,, is closest
`to P,, then the bit is considered to be a 0.
`The detection method outlined with reference to FIG. 3 is
`
`10
`
`15
`
`30
`
`35
`
`40
`
`US 6,633,653 B1
`
`4
`between P, and P, (i.e. on the dashed line 4 of FIG. 3) then
`one would not know whether it should be a 1 or a 0 so the
`confidence of decision becomes0.
`
`based on the assumption that any legitimate intermediate
`processing will not alter the phase such that it goes beyond
`the point whereit could be correctly recovered. Referring to
`the figure, this implies that if the phase P,, is significantly
`altered by intermediate processing such that it falls below
`the dashed line 4 for example, then a 1 will be detected
`instead of a 0 because the phase is closer to P, than P,.
`To improve recovery of the watermark, the mark may be
`repeated in each of the 16x16 blocks of the image. Thus, for
`a QCIF image (176x144 pixels) there will be up to 99
`repeats of the watermark (in practice not all blocks are
`watermarked to reducevisibility). Thus, an average over all
`the blocks can be taken to give the recovered watermark.
`However, information within each received block can be
`used in order to provide more information about what has
`happened to that block since the image was watermarked.
`In embodiments of the invention, a confidence measure
`Cn for recovered phase Pn is defined as
`C,=1-(2*|P,-P,|P.-P,)
`where P,, is the recovered phase for bit n of the watermark,
`|| denotes modulus, and P,,, P, are the nearest reference phase
`levels, where P,, was chosen as the closest. In the example
`shownin FIG. 3, P,=P,, and P,=Po.
`Thus, if phase P,, was equal to P,, a 0 would be detected
`as the watermark bit with confidence 1. If it falls midway
`
`45
`
`50
`
`55
`
`60
`
`65
`
`blocks of the image may be watermarked. When determin-
`ing the confidence of the image, one would expect those
`areas which have been watermarked to have a higher con-
`fidence measure and therefore higher confidence level, than
`those which have not been watermarked. Thus, in a modi-
`fication and to improve security, only selected area are
`watermarked and the receiving party needs to be made
`aware which areas those are. ‘his can be done by a key
`method. Since the receiver then knows those areas of the
`
`image which are watermarked, he will expect to see higher
`confidence measures in those area. This represents an addi-
`tional level of security since a “hacker” may know that
`watermarks and confidence levels are being detected, but
`will then be unlikely to know which particular blocks he
`should concentrate on.
`It
`is possible to combine the methods of the present
`invention with a bit error rate (BER) measurement of the
`recovered watermark per block, with respect to the original
`watermark (if known), for example. By using a BER along-
`side the confidence measure, security and confidence can be
`increased. A BER can be used on its own,but fails to detect
`certain types of tampering.
`When the invention is used in the spatial domain, then
`amplitudes may be used instead of phases by addingto, or
`subtracting from the luminance value of selected pixels, an
`amplitude value (e.g. 2) depending on whether the bit is to
`be a 1 or O (ie. adding a value if it is to be 1, subtracting if
`it is to be 0). At recovery, an estimate of the original value
`is made and then a confidence measurement is made by
`
`

`

`US 6,633,653 B1
`
`5
`determining, how close the actual valueis to be either of the
`two values expected. So, if the recovered value An lies
`between expected values A, and A,but closer to A, than the
`confidence measure is defined as follows:
`
`Cy=1-2*|A,-AVIA.Ay))
`
`Note that instead of a binary code, a different code may
`be embedded as a watermark in some embodiments, both in
`the spatial and transform domains.
`It is described above how a hacker may knowthat, for
`example, 16x16 blocks are being watermarked. A further
`measure, which can be used to improvesecurity, is to change
`the origin of each block. Referring back to FIG. 1, the block
`1 has its origin, i.e. start point at pixel O,. The first block
`would then normally be the top left-most block of the image,
`for example. In an origin changing technique, the origin
`from which each block is then subsequently measured is
`offset. For example, pixel O, may be usedas the origin. This
`will offset the block by one pixel. The hacker than needs to
`know notonly the size of the blocks but also the origin point
`of each block and again this improvessecurity. Clearly, the
`information regarding the offset of the origin will need to be
`given to the receiver but this could again be done bya key
`system.
`The techniques outlined above are very efficient at
`improving the confidence in watermarked images. However,
`watermarks are often themselves distorted and/or may
`become impossible to recover when an image undergoes
`some sorts of legitimate processing such a JPEG compres-
`sion and decompression.
`The confidence measure of the present invention may be
`used to detect tampering if it is examined over each block in
`the image. In orderto do this, the confidence measure forbit
`nin a given block is compared with the measure for bit n of
`the watermarkin all other blocks of the values. Anomalous
`
`values can be evidence of tampering. However, the confi-
`dence measure itself may be subject to variation within a
`block due to the impact of JPEG processing. JPEG process-
`ing is achieved, as is known, by quantization of the DCT
`(Discrete Cosine Transform)coefficients of an image, which
`thus impact the phase. The DCT blocks in JPEG are of 8x8
`pixels and so there are four 8x8 blocks in a 16x16 block.
`JPEG quantization is not constant throughout each 8x8 pixel
`block but
`is defined according to a quantization table.
`Quantization becomesincreasingly coarse as the coefficients
`go up in frequency since the eye is less sensitive to high
`frequency components.
`An example of the impact of JPEG processing on a 52 bit
`watermark is shown in 'IG. 5 where the confidence level as
`
`a percentageis plotted against the watermark bit number.It
`is seen from the figure that the confidence measure varies
`within the watermark depending uponthe positionof the bit.
`Acyclic pattern is noted having approximately regular peaks
`and troughs whose periodicity depends on the relationship
`between the embedding pattern (and the blocksize used for
`watermarking) and the JPEG quantization which is based on
`8x8 pixel blocks.
`In modifications of the invention, a simple method to
`improve the confidence of recovery of the watermark with-
`out destroying its fragility (which is essential for tamper
`evidence) is to shuffle the embedding of the mark in each
`block. This maybe done in one embodimentby repeating the
`watermark in each block but rotated one bit at a time, as
`shown in the following Table 1.
`
`ay 0
`
`15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`TABLE1
`
`Block
`
`Start bit
`
`0
`1
`
`‘99
`
`0
`1
`
`47
`
`1
`2
`
`48
`
`2
`3
`
`49
`
`End bit
`
`51
`0
`
`46
`
`50
`51
`
`45
`
`It will be appreciated that many other methods of shuf-
`fling may be used. The watermark may be rotated by more
`than one bit at a time, it may be shuffled between blocks in
`a pseudo random manner or by many other patterns and
`schemes as will be appreciated.
`The effect of this rotation or shuffling is that the overall
`confidence of recovery of the watermark is now consistent
`on the average(i.e. taking all watermarked blocks within the
`image) for each of the 52 bits. In addition,
`the essential
`property that confidence for a given bit position within a
`16x16 block can be examined with reference to the complete
`image has been preserved and thus the watermark can be
`made more robust (that is more reliably detected) without
`affecting its tamper evident properties.
`It should be noted that the above method does not depend
`on any particular periodicity in the confidence measure with
`respect to watermark bit number as this may change if the
`watermark bits are reordered within the image block in
`which they are embedded.
`Again, the modification as shown with reference to Table
`1 is equally applicable in both spatial and transformed
`domain watermark systems. It
`is particularly applicable
`where the original image and/or original watermark maynot
`be available at the receiver when detection of the watermark
`
`takes place.
`Watermarking in itself can have a visible effect on the
`image. It is important to choose carefully those parts (ie.
`blocks) of the image which are to be watermarked. If the
`watermark is too visible, then it is easy for a hacker to
`reproduce the watermark. Accordingly,
`in order to be
`successful,
`a watermarking and confidence measuring
`scheme requires blocks to be watermarked which can have
`a high confidence measure and also low visibility.
`It is generally prudent not to watermark areas of an image
`which are of low texture.
`
`For watermarking schemes in the frequency transform
`domain in particular, but also for use in the spatial domain,
`the inventors have found that interesting information can be
`obtained by a study of the variance of the magnitude of the
`digital Fourier transform. FIG. 6 showsthree plots. A first
`plot 6a is of the confidence level for some of the blocks in
`a particular image. The confidence measurements are shown
`as squares and these are joined together to form a plot.
`Overlaid upon this is a further plot 6b which shows the
`variance of the magnitude of the DFT coefficients of each
`block. An additional plot 6c shows the mean magnitude of
`the DFT coefficients of the blocks which were selected for
`watermarking with respect to the mean magnitude ofall the
`DFTcoefficients of the block.
`The variance levels of FIG. 6b are taken as percentages
`relevant to the figure having the highest variance, which is
`considered to be 100%.
`It is seen that the highest confidence levels are generally
`obtained for those parts having lower variance (e.g. blocks
`6d, 6e, 6f). Accordingly, for the best results, it is preferable
`to choose to watermark those parts of the image which have
`a relatively low variance. In some embodimentthis maybe,
`for example, those parts of the image which have a variance
`
`

`

`US 6,633,653 B1
`
`7
`of less than about 50%. If a block has a variance of less than
`50% then this is considered to be a good candidate for
`watermarking since this block will then have lowvisibility
`and high confidence.
`It is found that patterns similar to that of FIG. 6 are
`obtained with most images.
`Table 2 below showsthe effects of watermarking three
`different images, respectively called “house”, “rose” and
`“beans”, and of watermarking those parts of the image
`which have a variance in magnitude of DFT ofless than
`50%. The overall confidence varies from 75.5 to 89.78% and
`the visibility of the watermarks is good (i.e. this meansthat
`the watermarks are not particularly visible).
`
`TABLE 2
`
`No. of
`Overall
`blocks
`w/martked BER (%)
`35
`3.81
`60
`6.99
`9
`0.31
`
`Overall
`Confidence
`(%)
`80.2
`75.5
`89.78
`
`Test
`Image
`House
`Rose
`Beans
`
`Avg. PSNR Visibility
`(dB)
`of w/mark
`83.23
`Good
`78.5
`Good
`87.5
`Good
`
`In each of the images, a total of 64 blocks were available
`to watermark and only some of these were chosen to be
`watermarked, depending upon whether they had the correct
`variance.
`Table 3 belowindicates the results of a second schemefor
`the same three images in which a block was watermarkedif
`the mean magnitude of the 36 DFT coefficients which were
`chosen for watermarking wasgreater than 40% (that is 40%
`of the total mean magnitude for the DFT block). It is seen
`that although the confidence overall is increased, the vis-
`ibility of the watermarks is not as good as for those chosen
`only whenthe variance is less than 50%.
`
`TABLE 3
`
`No. of
`Overall
`blocks
`w/martked BER (%)
`29
`0.57
`
`Overall
`Confidence
`(%)
`88.1
`
`33
`
`22
`
`3.68
`
`0.25
`
`80.1
`
`89.82
`
`Test
`Image
`House
`
`Rose
`
`Beans
`
`Avg. PSNR Visibility
`(dB)
`of w/mark
`83.16
`Notas
`Good as A
`As Good
`asA
`Notas
`Good as A
`
`84.4
`
`75.0
`
`Table 4 below indicates a scheme in which a block was
`chosen to be watermarked only if both the conditions of
`Table 2 and 3 weresatisfied, that is if the variance of the
`magnitude of the DFT was less than 50% with respect to
`peak variance and the mean magnitude of 36 coefficients
`chosen to watermark was greater than 40% ofthe total mean
`magnitude.
`
`TABLE 4
`
`No. of
`Overall
`blocks
`w/marked BER (%)
`1?
`0.49
`
`Overall
`Confidence
`(%)
`88.6
`
`30
`
`9
`
`3.85
`
`0.31
`
`81.1
`
`89.8
`
`‘Lest
`Image
`House
`
`Rose
`
`Beans
`
`Avg. PSNR Visibility
`(dB)
`of w/mark
`85.3
`As Good
`as A
`Ais
`slightly
`better
`As Good
`as A
`
`87.5
`
`79.5
`
`It is seen that the overall confidence levels are high and
`also that the visibility of the watermarks is good.
`
`8
`Note that only a small number of blocks met the require-
`ments for this table. By using origin offsetting it may be
`possible to change the origin so that more blocks are
`suitable, and thereby maximize the numberof blocks which
`have the preferred characteristics for watermarking.
`Referring back to watermarking images which are then
`subject to JPEG compression, FIG. 7 shows twoplots 7a and
`7b of varying degrees of JPEG compression. 7a shows the
`confidence in blocks which have been subject
`to a 4:1
`compression whereas block 7b shows ones which have been
`subject to an 11:1 compression. As shown, the peaks and
`troughs in the confidence measure are generally in line, but
`the greater compression tends to reduce the amplitudes of
`the peaks and troughs. Thus, confidence measures can work
`over a great variation of images and image compression
`techniques. Confidence valucs change in predictable ways
`for legitimate processing.
`FIG. 8 shows the changes in confidence level which
`occurred when an image wasdeliberately tampered with, in
`this case by cutting and pasting certain blocks and parts of
`the image. Plot 8a indicates the confidence levels per block
`and plot 8b shows which blocks were tampered with by
`cutting and pasting. A correlation is observed and the user
`can determine that the image may have been tampered and
`may therefore be unreliable as evidence.
`Whatis claimed is:
`
`1. A tamper detection method for digital images compris-
`ing:
`providing a digitally watermarked image;
`digitally processing at least some watermarked parts of
`the image to obtain confidence values; and
`using the confidence values to provide an indication as to
`the likelihood that the image has been tampered with,
`wherein the digital watermarking is made on blocks of
`the image of a predeterminedsize, a discrete Fourier
`transform (DFT)is applied to the image on a block
`by block basis to generate a plurality of DFT
`coefficients, and a watermark is applied to each one
`of a selected number of DFT coefficients within a
`
`block byselecting the phase of that DI'T coefficient
`to be equal to the phase of oneor other of a plurality
`of phase values, of a set of quantized phase values,
`which are closest
`to the actual phase, dependent
`upon the value with which the watermarkedbitis to
`be embedded, and
`wherein during recovery of the watermark, a discrete
`Fourier transform is again taken of each block and
`the watermark is recovered by determining which of
`the quantized set of levels the recovered bit phase
`data is closest to, wherein each confidence value is
`related to the proximity of the recovered phase to one
`or more of the quantized set of phase levels.
`2. The method as claimed in claim 1, wherein the water-
`mark is represented by a binary code.
`3. The method as claimed in claim 1, wherein a confi-
`dence measure for each bit n of recovered phase P,, is
`defined as
`
`C,=1-2*|P,-P,|/|Px-Py))
`where P,, is the recovered phase for bit n of the watermark,
`|| denotes modulus,and P,, P,, are the nearest reference phase
`levels, where P, was chosen asthe closest.
`4. A tamper detection method for digital images compris-
`ing:
`providing a digitally watermarked image;
`digitally processing at least some watermarked parts of
`the image to obtain confidence values; and using the
`
`10
`
`15
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`awn
`
`

`

`US 6,633,653 B1
`
`9
`confidence values to provide an indication as to the
`likelihood that the image has been tampered with,
`wherein the digital watermarking is done on blocks of
`the image of a predeterminedsize,
`wherein an amplitude value is added to, or subtracted
`from, an amplitude relating to each one of a number
`of sclected pixels of the block, depending upon
`whether the value with which the watermarkedbit is
`to be embedded, and wherein during recovery of the
`watermark, an estimate of the actual amplitude value
`is made, and wherein each confidence value is
`related to the proximity of the recovered amplitude
`
`10
`to one or more of a quantized set of reference
`amplitude levels, and
`wherein a confidence measure for each bit is of recov-
`
`ered amplitude A,, is defined as:
`
`C,=1-(2* |A,-A,|/14,-A,))
`
`is the recovered amplitude for bit n of the
`where A,,
`watermark, || denotes modules, and A,, A, are the nearest
`reference amplitude levels, where A, was chosen as the
`19 closest.
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket