Method for Adaptive Digital Watermarking Robust Against Geometric Transforms
TECHNICAL FIELD
The invention refers to the field of digital watermarking and in particular to generating and extracting digital watermarks for images or video sequences .
BACKGROUND ART
Two major conflicting constraints on digital image watermarks are invisibility, i.e. avoiding perceptible arti- facts in the watermarked or stego image, and robustness, i.e. resistance against various intentional or unintentional attacks such as affine geometric transforms (rotation, scaling, aspect ratio changes, shear) , translation, cropping, image compression etc. In earlier solutions the information to be embedded was encoded using e.g. M-ary modulation (M. Kutter, "Performance Improvement of Spread-Spectrum based Image Watermarking Schemes through M-ary Modulation" , Lecture Notes in Computer Science: Third International Workshop on In- formation Hiding, Springer, Vol. 1768, 237-252) or algebraic error correction codes (ECC) (J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodrigez and G. Nieto, "The impact of channel coding on the performance of spatial watermarking for copyright protection", Proc . ICASSP'98, 2973-2976, May 1998) . M-ary encoding suffers from a high complexity of the watermark demodulator, whereas error correction codes are less effective. On the other hand, turbo codes and BCJR, log-MAP or max-log-MAP decoders (C. Berrou and A. Glavieux, "Near optimum error correc- ting coding and decoding: turbo-codes", IEEE Trans. Comm. , 1261-1271, October 1996) or low-density parity
check codes (R. Gallager, "Low-density parity-check codes", IRE Transactions on Information Theory, January 1962) have not been applied to digital watermarking.
The perceptual mask has to determine the optimal level of allowable distortions for the watermark embedding. An overview of empirical masking methods based on the deterministic models of the human visual system (HVS) is given by S. Voloshynovskiy, A. Herrigel, N. Baumgartner and T. Pun, "A Stochastic Approach to Content Adaptive Digi- tal Image Watermarking" , Lecture Notes in Computer Science: Third International Workshop on Information Hiding, Springer, Vol. 1768, 211-236. The main problem consists in the content-adaptive watermarking, since in the most cases the HVS mask is given in the coordinate domain and watermark embedding is performed in some transform domain (block-wise and full-frame discrete Fourier (DFT) or discrete cosine (DCT) transforms, wavelet or Radon transforms) . The embedded watermark is then transformed to the coordinate domain and mapped by the mask. More recent me- thods try to utilize either transform domain masking based on a just noticeable difference that originates from the image compression applications (I. Podilchuk and W. Zeng, "Image-Adaptive Watermarking Using Visual Models", IEEE Journal on Selected Areas in Communications, 16(4), 525-539), or combined masking in frequency and coordinate domains (U. S. Pat. No. 6,031,914). In the latter, a major drawback is that both a frequency-domain and a spatial-domain perceptual mask must be applied consecutively in order to achieve invisibility. Furthermore, the watermark can only be extracted when the unmarked image is accessible.
In the above-mentioned publication by S. Voloshynovskiy et al . a stochastic perceptual mask based on a noise visibility function NVF is proposed. However, since the NVF and the perceptual mask are developed only in the spatial coordinate domain, they are not well adapted for calcula-
tions in a frequency domain and are not easily modifiable by restrictions stemming from the frequency domain.
Robustness against geometrical distortions has so far been relied on using a transform invariant domain (J. Oruanaidh and T. Pun, "Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking" , Signal Processing 66(3), 303—317, 1998), or an additional template (WO 96/36163), or an Autocorrelation Function (ACF) of the watermark itself (M. Kutter, "Watermarking resistent to translation, rotation and scaling", Proc . SPIE Int. Symp. on Voice, Video, and Data Communication, 1998) . The transform invariant domain approach suffers from interpolation and accuracy problems, therefore requires comparatively large images of size 512x512, and cannot recover rotational and aspect ratio changes simultaneously. The template approach needs a computationally expensive exhaustive search for recovering these transforms together, and it is susceptible to unauthorized removal of template peaks . In the ACF approach the water- mark is replicated in the image in order to create 4 repetitions of the same watermark. The corresponding 9 peaks in the ACF are used to recover undergone geometrical transformations. However, the descending heights of the ACF peaks shaped by the triangular envelope function reduce the robustness of this approach against geometrical attacks accompanied by a lossy compression. The need for computing two discrete Fourier transforms (DFT) of double image size to estimate the ACF poses problems in real time applications with large images. A further requirement for digital watermarking is a sufficient information capacity of the watermark. In order to attach a unique identifier to each buyer of an image, a typical watermark should be able to carry at least 60-100 bits of information. However few publications deal with 60 or more bits.
From the above review it is concluded that the existing technologies exhibit at least one of the following problems :
1. Constrained spatial domain modulation for content- adaptive watermarking.
2. Inability to resist against geometrical transforms accompanied by the lossy JPEG compression.
3. Low simultaneous robustness against lossy JPEG (DCT- based) and wavelet compression. 4. Low robustness against printing/rescanning for high quality commercial magazine printing.
5. No protection against intentional template removal.
6. Less than 60 bits encoding for limiting the complexity of the watermark demodulator or decoder.
DISCLOSURE OF THE INVENTION
It is the object of the present invention to provide an improved method of the type mentioned above that is in particular capable of dealing with at least some, preferably all of these problems. This object is achieved by the subject-matter as set forth in the independent claims. Preferred embodiments are described in the dependent claims. The present invention is well suited for watermarking still images and video data.
The invention resides in a method for embedding a digital watermark w in an image x, comprising the steps of encoding a digital message b in a codeword c, mapping the codeword c and allocating the mapped codeword c into a block B, producing a symmetric block B' of fourfold size by flipping and copying the block B once in every block direction, tiling the symmetric block B' in order to generate a symmetric digital watermark w with a period B'
and embedding the watermark w in the image x in order to obtain a stego image y. By tiling or repeating the basic block B' a plurality of times, periodic features are introduced into the final watermark w both in the coordina- te and frequency domain, that can be used for retrieving affine transform attacks undergone by the stego image. The block flipping makes the watermark w robust against stego image flipping attacks, i.e. rotations by 90°, 180° or 270°, and reduces the number of ambiguities during estimation of the undergone geometrical attacks . Furthermore, the block flipping increases the invisibility of the watermark w by visually decorrelating its repetitive structure in the coordinate domain.
Preferred embodiments are: adding a secret-key-dependent reference watermark wref in remaining orthogonal spatial locations of the block B to render the resulting watermark w robust against translation or cropping attacks undergone by the stego image y; up-sampling pixels of the block B or equivalently B' at least twofold in each block dimension for creating robustness against the finite resolution of image input or output media, such as printers and scanners; using a turbo code or a low-density parity check code for encoding the digital message b thereby keeping the block size small; using a secret encryption key for encrypting the codeword c and/or a secret block allocation key for block allocation to improve the safety of message hiding and decoding; embedding the watermark w in the image x in wavelet sub-bands k,l, wherein k is a resolution index and 1 a direction index thereby provi- ding full compatibility of the embedding procedure with the recently developed wavelet-based compression standard JPEG2000.
The invention further resides in a method for embedding a watermark w in an image x, comprising the steps of: calculating image wavelet components xu (i, j) and watermark wavelet components wk l(i, j) for pixel locations i,j, based
on the xk l (i, j) calculating in the wavelet sub-bands k, 1 a noise visibility function NVFk,ι(i/j) and therefrom a perceptual mask PMk,ι(i,j) for masking the wk l (i, j) and embedding the masked watermark wavelet components into the ic i r) to produce stego image wavelet components y*/(?' >./) and calculating by an inverse discrete wavelet transformation (IDWT) the stego image y. By using a stochastic approach to image analysis based on the NVF and by defining in the wavelet domain the NVF and a NVF-based per- ceptual mask PM, invisibility constraints, frequency- domain constraints and geometric robustness constraints can be incorporated into a single perceptual mask PM.
Preferred embodiments refer to: calculating the noise visibility function NVFk,ι(i,j) from a stationary generali- zed Gaussian model or a non-stationary Gaussian model of the image x; incorporating in the perceptual mask PMk,ι(i,j) watermark strengths S ,ι for edges and textures of the image x with a weighting factor 1-NVF and watermark strengths Sf ,ι for flat regions of the image x with a weighting factor NVF; wavelet-domain embedding by multiplying PMk,ι(i,j) with wfc!(z, /) and adding xkιl (i, j) ; adapting the watermark strengths S ,ι and/or Sf k,ι in order to take advantage of a frequency-dependent modulation transfer function (MTF) and/or a spatial orientational dependence of the human visual system (HVS) ; in particular choosing Se k,ι ≥ Sf k,ι for a majority of or all wavelet sub-band indices k, 1 and/or choosing Seι,ι>Se 2,ι>Se 3/ι>Se,ι<Se 5,ι and Sfι,1>Sf 2,ι>Sf 3,ι>Sf 4,ι Sf5,ι for k=1...5 and/or choosing Se k,ι<Se k,3, Se k,2<Se k,3 and Sf k/1<Sf k,3, Sf k,2<Sf k,3, wherein the indices 1=1 and 1=2 denote a horizontal and vertical orientation and 1=3 a diagonal orientation in the image x; and/or compressing the image x in the wavelet sub-bands k, 1 before the watermark embedding in order to realize "compressed domain watermarking". The invention further resides in a method for extracting a watermark w, that was previously embedded according to
invention, from a possibly attacked stego image y' , comprising the steps of: calculating an estimated watermark w from the stego image y1, defiling the estimated watermark w into the symmetric block B' by summing correspon- ding portions of a plurality of periods of the estimated watermark w and converting the symmetric block B' into the block B and extracting the digital message b from the block B. This extraction method assures that full advantage is taken of the tiling and flipping operations per- formed during watermark embedding.
Preferred embodiments refer to : using a maximum a posteriori probability (MAP estimation) for calculating the estimated watermark w; estimating a watermark-covariance matrix Rw globally; estimating an image-covariance matrix Rx locally; estimating and correcting a geometric affine transform from peaks in the spectral power density |F(W) |2 and/or the autocorrelation function (ACF) w*w of the estimated watermark w; cross-correlating the block B with a reference watermark wref to compensate translations and/or cropping; down-sampling a previously up-sampled block B by averaging identical neighbouring pixels; using secret key for block deallocation and/or message decryption; and/or using a BJCR, a log-MAP or a max-log-MAP decoder for soft decoding previously turbo-coded digital messages b.
Other objects, features and advantages of the present invention will become apparent from the description in connection with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The drawings show in
Fig. 1 an embodiment for generating a digital watermark w robust against geometrical transforms;
Fig. 2a exemplary wavelet pyramids of a cover image x ("Lena"), in Fig. 2b of the digital watermark w, and in Fig. 2c of the noise visibility function NFV of the cover image x; Fig. 3a the modulation transfer function (MTF) of the human visual system (HVS) and a state-of-the-art non-adaptive embedding;
Fig. 3b a 1-dimensional wavelet decomposition and Fig. 3c an adaptive embedding according to a preferred embodiment;
Fig. 4 a 2-dimensional wavelet decomposition related to the MTF;
Fig. 5 an embodiment for embedding the digital watermark w robustly in the wavelet domain; Fig. 6 an embodiment for extracting and decoding the digital watermark w from an attacked stego image y' ; and
Fig. 7a-7d watermark extraction using spectral power density peaks: watermark w=cover image x-stego image (Fig. 7a) , an estimated
Fig. 7a-7d digital watermarks w, w extracted by using spectral power density peaks: cover image x-stego image y (Fig. 7a) ; watermark estimated by denoi- sing a stego image y (Fig. 7b) , a compressed ste- go image y' (Fig. 7c) and a rotated and compressed stego image y' (Fig. 7d) .
In the drawings identical parts are designated by identical reference numerals.
MODES FOR CARRYING OUT THE INVENTION
Formulation of a preferred embodiment:
We formulate the embedding process as an additive content-adaptive watermarking in the wavelet domain with the watermark possessing special spatial structure that enables to recover general affine transforms. We assume that we are given a cover image to be watermarked denoted x. If it is an RGB image we work with the luminance component, though the same methodology can be applied to other color spaces. The given message (the copyright information or URL address) in binary form b = (b1 ,...,bLJ is to be embedded in the cover image x = (xv...,xN ) of size M, xM2 , where N = M1 - M2 .
Message encoding and spatial allocation: Fig. 1 shows an example of watermark creation. The message b is first encoded 1 in a codeword c using preferably either low-density parity check codes (R. Gallager) or turbo codes (C. Berrou and A. Glavieux) , the publications of which are herewith incorporated in this applica- tion in their entirety by reference. The maximum rate at which these codes can be used is known to be bounded below channel capacity. However, the existence of simple iterative decoding schemes and their outstanding error performance more than compensate this weakness. The codeword c is then mapped 2 from {0,1} to {-1,1} and encrypted 3 by multiplying on a key-dependent sequence p with following spreading 4 over a square block B of size N, x N, with some density D using a secret key. In the general case, it could also be a rectangular block B or a block B of any shape.
The key-dependent reference watermark wref is added 5 to the above block B in some or all remaining orthogonal spatial locations . The reference watermark wref is used to recover cropping and translation based on the cross-
correlation with the attacked stego image y' . The reference watermark wref consists of a binary key-dependent sequence {-1,1} and its length is determined by the embedding density (1-D) as is described above. The resulting block B is up-sampled 6 by the factor 2 to receive a low-pass watermark and then flipped and copied 7 once in each direction, producing a symmetric block B' of size 4Nl x4Nl . The flipping 7 is performed to visually decorrelate the structure of the repeated watermark w and to reduce the number of ambiguities during estimation of the undergone geometrical attacks. Finally, the 4^x4^ block B' is repeated preferably over the whole image size, resulting in a symmetrical and periodical watermark w with periods T, — T2 = 4N, . In our applications we use L=64 bit messages that are encoded using the turbo code
(K=132). The block size is chosen to be JVj=19 resulting in a density D=0.74 in order to have exactly 2 times repetition of the codeword c in every block B. The final block B' after up-sampling 6 and flipping 7 has the size 76x76 _ rpfte gcheme is very flexible in respect to the encoding 1 and can use any known modulation technique or even more advanced error correction codes (ECC) .
Stochastic multi-resolution image modeling and watermark embedding: The principle of watermark embedding is shown in Fig. 5. To embed the above obtained watermark w in a cover image x a linear additive scheme is used in the wavelet domain. Both the cover image x and the watermark w are first decomposed into multi-resolution sub-band pyramids using the (discrete) Forward Wavelet Transform (FWT or DWT) . First, the cover image x is padded to a square size of the nearest larger number to the original cover image size of power of 2 in order to apply a standard wavelet transform DWT, 9. In the numeric example below, Nw = 5 levels are used for the DWT based on the Daubechies 8-tap filter (M. Vetterli and J. Kovacevic, "Wavelets and Sub-
band Coding", Prentice Hall, 1995). This results in 6 resolution sub-bands k or scales. Scales from 1 to Nw = 5 are also divided into 3 components corresponding to distinct orientations 1, for horizontal (H) , vertical (V) and diagonal (D) directions. The lowest scale k = Nw + l however consists of only a low-pass component. Fig. 2a shows the pyramids of the cover image x and Fig. 2b of the watermark w.
The watermarking process is applied and adapted to each (k,l) wavelet sub-band component separately as described below. Finally, the stego image y is reconstructed by computing the Inverse Wavelet Transform (IWT, 12) of the digitally watermarked image pyramid.
An important issue is the adaptation of the watermark w to the properties of the HVS, i.e. content-adaptive watermarking. Assuming we are given a masking function of the HVS, we wish to embed the above described watermark into the cover image x keeping it under the threshold of visual imperceptibility . We propose to use a stochastic perceptual mask PMk,ι(i,j), 11 based on a noise visibility function (NVF) proposed by Voloshynovskiy et al and earlier developed only for the coordinate domain. Here the NVF is for the first modified in order to include the multi-resolution paradigm in the stochastic framework to take into account a modulation transfer function (MTF) of the HVS and to match the proposed watermarking algorithm with the recently developed image compression standard JPEG2000 for future integration. This practically means that different watermark strengths S or Se, Sf are as- signed to different image sub-bands k, 1. Such a modification leads to a non-white spectrum of watermarks w being matched with the MTF. Previously this could not be achieved with the coordinate-domain based version of the NVF. The second reason to use wavelet domain embedding is motivated by the desire to incorporate the anisotropy of the HVS to different spatial directions in the perceptual
mask PMk,ι(i,j), 11. The coordinate domain version of the NVF used only an isotropic image decomposition based on the extraction of a local mean from the original image or its high-pass filtered counterpart. In the wavelet domain k, 1 the image coefficients in 3 basic spatial directions, i.e. horizontal (1=1), vertical (1=2) and diagonal (1=3), are received as a result* of the decomposition, which therefore allows to exploit the anisotropic sensitivity of the HVS. As a result, the watermark strengths S can be varied for different orientations 1 in the proposed mask PMk,ι(i,j), 11.
The NVF is based on a stationary Generalized Gaussian (sGG) model or on a non-stationary Gaussian model of the cover image x or the cover image wavelet coefficients Xk i V' J) ror every sub-band k, 1. Accordingly the perceptual edge and texture masking in the wavelet domain is modeled based on the NVF, of pixel (i, j) , for each sub-band component (k,l) :
σ~ is the global variance of the wavelet image coefficients from sub-band (k,l) , and the watermark wavelet components w
k j (i, j) can be written as
where T(t) is the gamma function. The NVF's features for a given sub-band k, 1 are determined by the global sub- band variance σ~ and by the shape parameter y
kJ {i, j) which is estimated based on the moment matching method (A. Jain, "Fundamentals of digital image processing",
Prentice-Hall, 1989) . An example of the NVF pyramid for image "Lena" is shown in Fig. 2c.
Finally the weighted watermark is added to the cover image x using the following embedding rule: y
k,
t («, J)= x
kJ (*, j)+ ((l - MF
kJ (i, ;))
• S
k e, + NVF
U (i, > S , )
• w
u (i, j) (G4) wherein the factor in front of the w
k l (i, j) defines the perceptual mask PMk,ι(i,j). The y
j\ j) are the obtained stego wavelet components and PM
k,ι(i,j) • w
4 (z, j) are the perceptually masked watermark wavelet components. S ,ι is an embedding strength for the edges and textures, and S
f k,ι is a strength for the flat regions of the cover image x. Visual masking is ensured first by choosing
greater than S
f k,ι for edges and textures hiding, and second by using adapted strengths for each resolution, and even for each orientation based on the properties of the MTF. An example of practically used embedding parameters according to the MTF properties, considering cover image pixel values in the range [0,255], are:
18 18 20 0 0.1 0.1 0.2 0
11 11 15 0 0.2 0.2 0.5 0 k,l 5 5 7 0 °k,l 0.5 0.5 1 0
2 2 4 0 1 1 2 0
5 5 7 1 2 2 3 1
where rows k denote decreasing resolutions, and columns 1 each orientation. The watermark strengths or embedding parameters Se,ι, Sf,ι reflect very important particularities of the HVS. First, the strengths of watermark for the diagonal directions are chosen to be higher than for the vertical and horizontal ones. This is motivated by the fact that the anisotropy sensitivity of the HVS to the diagonally oriented patterns is lower than for the vertical and horizontal directions. Therefore, it makes possible to embed stronger watermark signals there. Moreover, it allows to obtain, as a result, better robustness against lossy compression (both JPEG-DCT and wavelet JPEG2000) . The lossy compression is exploiting the same
property of the HVS to allocate smaller amounts of bits in the diagonal directions for the image coding. Therefore, the proposed embedding technique utilizes both information about the HVS and the quantization of lossy image coding to increase the robustness of the watermark w.
Second, the MTF of the HVS has a typical frequency dependence, as is shown in Fig. 3a (A. Jain, p. 55), with a maximum in a low frequency range and decreasing side lobes at very low and middle to high frequencies . In the case of non-adaptive watermark embedding (Fig. 3a) , the typical additive white Gaussian watermark has a uniform spectrum. A uniform increase of the watermark strength or equivalently watermark power density would violate the invisibility constraint at low frequencies. However, there still remains a lot of space for watermark embedding at the very low, middle and high frequencies below the threshold of imperceptibility . To exploit this opportunity we use the wavelet sub-band decomposition (Fig. 3b: wavelet subbands V1...V5 for a 1-dimensional example) , wherein the watermark strength could be adopted according to the local properties of the MTF (Fig. 3c) . This adaptation to the MTF is reflected in the proper choice of the embedding parameters. Se, Sf that have maxima in the corresponding frequency sub-bands k along each spatial direction 1 (Fig. 4) .
Third, the particular properties of the given image x within each sub-band k, 1 are taken into account using local watermark strength control based on the NVF, as discussed earlier. This feature has image dependent cha- racter oppositely to the previous two properties that characterize the HVS in general. Therefore, the proposed watermark embedding technique utilizes both general features of the HVS as well as local statistics of cover images x.
Watermark extraction and message decoding:
A generalized block-diagram of watermark extraction is shown in Fig. 6. The embedded watermark w is first estimated 13, w from the possibly attacked stego image y'. Secondly, geometric distortions which may have occurred are retrieved and compensated 15 to obtain a rectified watermark wrec, by analyzing 14 the Fourier transform F(w) or the spectral power density magnitude |F( ) I and/or an autocorrelation function (ACF) w*w of the estimated wa- termark w. The ACF is preferably obtained by w*w= F_1(|F(W) |2) with F_1() being the inverse DFT. The tiled blocks are then detiled or averaged 16 in order to get an estimate of the embedded redundant sequence according to the maximum likelihood (ML) estimate for a Gaussian chan- nel . The cropping and translation are compensated 19 using cross-correlation 18 with the reference key- dependent watermark wref, 17. Finally, the message is decrypted 20 and decoded 21.
Watermark estimation: To estimate the watermark w a maximum a posteriori probability (MAP) estimate is used: w = argmaxføx ( \ w)- pw (w)}
«**" , (G5) wherein pw() is the probability density function of the watermark w. Assuming that the image y' and watermark w are conditionally independent identically distributed locally Gaussian, i.e. x ~ N(x, Rχ ) and w ~ N(θ, Rw ) with the covariance matrices Rx of the image x and Rw of the watermark w, where Rw also includes the effect of perceptual watermark modulation, one can determine:
where the mean values y =x are assumed to be equal and where R
x = max(θ, R
y - R
w ) is the ML-estimate of the local
variance [ R
x -σ
x 2I with I=identity matrix) and R is an es
¬ timated covariance matrix of the original stego image y.
An important issue is the estimation of the watermark co- variance matrix Rw in the above estimate. This can be do- ne based on the available copy of the stego image y' . However, the severe distortions due to lossy JPEG compression could destroy the information about the texture masking that was used for the watermark embedding, and a histogram modification attack could damage the relevant information about contrast sensitivity masking. Since no reliable information about the perceptual mask PM is available after these attacks, we propose to use a global estimate of the watermark strength based on the available copy of the attacked image y' . This practically means that we assume spatial stationarity of the watermark Rw = όll . To estimate a global watermark variance we use the following formula:
where ά^(τn, n) is a local variance of the stego image y in the coordinates (m,n) , for an image of size N xM . The estimate (G7) is a global mean value of the watermark variance. Obviously, other robust versions of (G7) such as a robust median estimate of the variance could be applied, as well. Determining affine gepmetrical distortions:
To determine the affine transformation applied to the image we compute |F(w) |2 from the estimated watermark w, where F(w) is the discrete FT. Due to the periodicity of the embedded information, the estimated watermark spec- trum possesses a discrete structure. Assuming that the watermark w is white noise within the block B, the spectrum of the watermark w will additionally be uniform. Therefore, |F(w) |2 shows ■ aligned and regularly spaced peaks. For a T, xT2 -periodical watermark w , peaks will
have periods Mi/Ti and M2/T2 for a 2-D FT domain of size M, xM2 . If an affine distortion was applied to the stego image y, the peaks layout will be re-scaled, rotated and/or sheared, but alignments will be preserved. Therefore, it any affine geometrical distortion can be estimated from these peaks by fitting alignments and estimating periods .
Finding the matched points between the extracted positions of local peaks in the magnitude spectrum of the estimated watermark (zι,z ) and the reference grid (fχ,f2) computed based on the knowledge of the embedded watermark period, one can estimate the linear affine transform A using all matched points such that the next criterion is minimized:
where {} is a negative log-likelihood function associated with the distribution of the misaliments and k is a number of matched points. In the most common case, it is assumed that the misalignment distribution is Gaussian, and one receives a quadratic log-likelihood function mi2 and the corresponding mean square error minimization criterion. In the more general case, the above problem could be solved based on the theory of robust M- estimators, if some ambiguity about misalignment distribution exists.
Fig. 7a-7d show peaks extracted from the magnitude spectrum of the watermark |F(w) |2. In Fig. 7a, the real embedded watermark w is shown that was calculated by subtracting y-x using the knowledge of the cover image x in a non-oblivious approach, whereas in Fig. 7b the Wiener predicted watermark w is taken. Therefore, these peaks can be extracted from the stego data with high fidelity
based on the estimated watermark w without knowledge of the cover image x. This important conclusion is also connected with the observation that the embedded watermark w is mostly allocated in the middle frequency band. This has double importance. First, low frequencies of the stego image y or y' are not altered considerably in order not to produce visible distortions. Second, the watermark w will resist against lossy compression that removes mostly high frequency components from the image y or y' . Fig. 7c-7d show peaks extracted after lossy compression, without (Fig. 7c) and with (Fig. 7d) geometric distortions, here a 37° rotation of the stego image y' followed by a JPEG compression with a quality factor QF=50%. In experiments peaks could be properly extracted from JPEG compressed images with a quality factor QF up to 50. At the time of patent submission, no known watermarking method is able to resist to affine transforms combined with such a compression.
Recovering translation and cropping is based on the refe- rence key-dependent watermark wref, 17 (Fig. 6) . To reduce computational complexity and using the information about the periodicity of the watermark w we first perform watermark detiling 16, i.e. coherent summation of the estimated watermark w from different periods. This results in the symmetric block B' that is converted to the final block B of size N^N, . The block B is correlated 18 with the reference watermark wre . The maximum of cross- correlation 18 makes possible to establish the undergone translation or cropping that is easily compensated 19. Message decoding:
Assuming that attack, prediction and extraction errors could be modeled as additive Gaussian, the detector is designed using the ML formulation for the detection of a known signal (projection sets p are known due to the key) in Gaussian noise, that results in a correlator detector
r = (^ P) . ( G9 )
In more general cases, the detector should be designed for stationary non-Gaussian noise or for the non- stationary Gaussian case. Finally, given an observation vector r , the decoder that minimizes the conditional probability of error, assuming that all codewords b are equi-probable, is given by the ML decoder: b = argmax p[r \ b , x) b . (G10)
Based on the central limit theorem (CLT) most researchers assume that the observed vector r can be accurately ap- proximated as the output of an additive Gaussian channel noise for a large sample space.
We use symbol-by-symbol MAP decoder for the turbo code that is commonly known as a BCJR decoder, a log-MAP or a max-log-MAP decoder, i.e. soft decoding, that is known to be superior in comparison with the hard decoding for Gaussian channels.
While there are shown and described presently preferred embodiments of the invention, it is to be distinctly un- derstood that the invention is not limited thereto but may be otherwise variously embodied and practiced within the scope of the following claims.