Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition

In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.


Introduction
Digital watermarking is a method that is used widely to protect the copyright of digital contents, and it is one of the underlying techniques required to realize the vision of ubiquitous computing [1][2][3].
Steganography based on various forms of information hiding is the focus when detecting the presence of a hidden message, whereas watermarking and fingerprinting are different problems.These issues have been studied in various fields [4][5][6][7][8].
Structural changes in protected contents occur often in real-world applications.Therefore, experimental benchmark evaluations of digital watermarking are needed to assess the techniques that are available at present.However, very few researchers have tested their algorithms extensively.Kutter and Petitcolas considered the methods used to evaluate and compare the performance of robust invisible watermarking systems [9].They applied a duality approach to the watermarking evaluation problem where the evaluation criteria were divided into two groups: functionality and assurance [10].
In addition, several research groups have developed benchmarking tools, such as Stirmark, which can be used to select an attack from a comprehensive list [11].Other benchmarking tools have been developed as part of the European Certimark program, which began in 1999 [12], the WET (Watermark Evaluation Testbed) project at Purdue University [13], the OpenWatermark framework [14], a theoretical framework for practical evaluations [15], a benchmarking tool based on genetic algorithms [16], a systematic method for determining the number of test images [17] and a stochastic approach [18] that also considers the evaluation method.
The First International Workshop on Information Hiding and Its Criteria for Evaluation (IWIHC2014) (http://www.ieice.org/iss/emm/ihc/en/iwihc2014/),which included a watermarking competition, was held in Japan in conjunction with a major security conference, called ASIACCS2014 (ACM Symposium on Information, Computer and Communications Security).This workshop aimed at ascertaining the current state-of-the-art in digital watermarking algorithms.Only a few methods have been reported that satisfy the watermark criteria for images [19][20][21][22].In this workshop, we presented results in two competition categories: highest tolerance and highest image quality.In particular, we used the difference of the frequency coefficients derived from a discrete cosine transform and an error-correcting code (ECC) to satisfy the requirements of the Information Hiding and its Criteria [23], which both require coding tolerance and cropping tolerance.
In this study, we focused on the problem of obtaining the solution with the highest image quality according to the IHC evaluation criteria.Our proposed algorithm employs a statistical analysis to find the best positions in the frequency domains (a discrete cosine transform (DCT) or a discrete wavelet transform (DWT)) for watermark insertion.It should be noted that one of the most important goals is to satisfy the IHC evaluation criteria, but an additional objective is the introduction of our own IHC evaluation criteria.
The remainder of this paper is organized as follows.In Section 2, we present brief summaries of the IHC criteria.Section 3 describes the proposed algorithm, including watermark construction with an ECC, embedding, extraction and hiding capacity.The experimental results and conclusions are presented in Sections 4 and 5, respectively.

Summaries of the IHC Criteria
There have been many studies of digital watermarking, but the state-of-the-art has not yet reached the level required.The IHC Committee is working to improve this situation by promoting the development of digital watermarking techniques.In particular, it aims to help develop standard evaluation criteria and to sponsor watermark competitions based on these criteria [23].
In this section, we summarize the requirements of the IHC evaluation criteria.

Image Quality Assessment
The six images (color images that each contain more than 10 M pixels) provided by the IHC should be watermarked and then compressed.The file size should be less than 1  15 of the original size after the first compression, and the file size should be less than 1  25 of the original size after the second compression.The peak signal-to-noise ratio (PSNR) for each pair should be higher than 30 dB.

Tolerance Assessment
The files should be decompressed after the second compression.Ten HDTV-sized (1920 × 1080) images should be cropped from each decompressed image of 4608 × 3456 pixels.The vertices of these cropped images are listed in the document describing the IHC criteria.The watermark should be sufficiently tolerant, such that it can be detected in no less than 200 bits in each cropped image.

Watermark Information
The amount of watermark information that needs to be embedded comprises 200 bits.The information should be generated using eight ordered maximal length sequences.The initial values are listed in the document describing the IHC criteria.Color images, such as RGB images, are comprised of three independent channels for the red, green and blue primary color components.Figure 1 shows the splitting of the color channels for a full RGB color image.In our system, the embedding process is applied to each channel repeatedly.

Overall Approach of Our System
In this study, the cropping positions are based on the IHC evaluation criteria.Therefore, it is assumed that the cropped image size is known.According to the IHC evaluation criteria, 10 HDTV-sized (1920 × 1080) images should be cropped from each decompressed IHC standard image (4608 × 3456).
If a cropped image is selected as an area of M × N pixels in the watermarked image, we can select a size of M 2 × N 2 as an embedding block.At this point, the watermark and sync bits are embedded in each embedding block.For the entire original image (H × V , where H is the horizontal size and V is the vertical size) with each color channel, the number of embedding blocks is computed as 1,920 × 2×3,456 1,080 = 24 (rounding toward zero).In this study, we prepared 10 types of watermark for embedding, which could be represented in binary form and generated using eight ordered maximal length sequences with 10 types of initial values based on the IHC evaluation criteria.The binary watermark (200 bits) was first coded using the well-known BCH codes to produce the actual embedded bits, as shown in Figure 2.

Encoding the Watermark
The BCH code is named after Bose, Ray-Chaudhuri and Hocquenghem, who described methods in 1959 and 1960 for designing codes over GF(2)with a specified design distance.Subsequently, the decoding algorithms were developed by Peterson et al. [24].
As shown in Figure 2, the BCH encoder generates a BCH code with message length k and codeword length n.For a given codeword length n, only specific message lengths k are valid for a BCH code.The error-correction capability (t) of the valid [n, k] pair used in this study can be described as follows: [n, k, t].Tables 1 and 2 show all of the possible combinations for a BCH code of codeword lengths n = 63 and n = 511.In this study, we used [511, 31, 109] for the watermark bits and [63, 16,11] for the sync bits based on a heuristic method.All of the test results obtained in the present study were generated using MATLAB.The BCH code implementation is readily available in the Communications System Toolbox in MATLAB.

Approach to One-Bit Embedding
In the first approach, a DCT was applied to an 8 × 8 pixel block-unit in one embedding block (960 × 540) to produce an M 2 × N 2 sized area.As a second approach for testing the best positions in the frequency domains, we selected 12 areas of the wavelet coefficients based on a statistical analysis.
As shown in Figure 3, this method can embed 4020 bits into one embedding block, because two pairwise DCT or DWT blocks are needed for one-bit embedding.The shaded elements in Figure 3 indicate the best positions for comparing the pairwise DCT or DWT coefficients in this study.Figure 4 presents an example of the application of statistical data in this study, which shows the statistical data for the IHC standard image (flower garden).To consider the quality and tolerance of image compression, we selected some frequency areas with relatively low entropy.

Embedding Process
As shown in Figure 3, let D a be an 8 × 8 DCT or DWT block, where a ∈ {1, ..., 8, 040} and D a (i), D a+1 (i) is the comparison target for one-bit embedding, where i = 1, ..., 4 or i = 1, ..., 12.The insertion method is as follows (see Figure 5).(1) The original image is separated into color channels and subdivided into 8 × 8 pixel blocks.Before insertion, each 8 × 8 pixel block is processed using the DCT or DWT.
(2) Let b w ∈ {0, 1} be the embedded value.Modify the DCT or DWT coefficient values in block D a according to the following rules.
To embed b w = 1: where D is the current DCT or DWT block, D ′ is the watermarked DCT or DWT block, α is the embedding strength and st is 1 2 for the sync bits and 1 4 for the watermark.

Extraction Process
The one-bit extraction method is as follows (see Figure 6).(1) Select two pairwise DCT or DWT coefficients in the watermarked block (D a and D a+1 ).Count the state according to: where Cnt is a count state variable with an initial value of zero.
(2) The total comparison number is 3 × 3 = 9 (comparison of three DCT coefficients × three color channels).In the case of DWT, 12 × 3 = 42 are compared from the selected detail wavelet coefficients (comparison of 12 DWT coefficients × three color channels).
(3) The total counter is assigned a majority decision rule to extract one bit.

Decoding the Extracted Bits
As mentioned in Section 3.2, the watermark is encoded using a BCH encoder, and the decoding process is shown in Figure 7.The BCH decoder can correct up to a certain number of errors.Thus, the [511,31,109] BCH code can correct errors of up to 109 bits, which is referred to as a 109-ECC.We also used the [63, 16,11] BCH code to correct the sync errors at the front of the selected embedding block.
The overall watermark extractor is as follows.
(1) Extract 63 bits from a selected embedding block and obtain 16 bits using the BCH decoder.
(2) Compare the Hamming distance (HD) between the extracted bits and the original sync bits using a threshold (T h).This threshold can be set based on a consideration of the system's performance (where zero is the default value).
(3) Extract 3577 bits from the remaining area of a selected embedding block, and obtain 217 bits using the BCH decoder (in the case where the HD is less than the threshold).
(4) Finally, we can obtain the extracted watermark (200 bits after excluding 17 bits) after applying an authentication process using a cryptographic hash function (e.g., SHA256).

Data Hiding Capacity
According to the IHC criteria, the watermark should be sufficiently tolerant, such that it can be detected in no less than 200 bits in each cropped image.In this study, the number of embedding blocks was 24, and one block measured 960 × 540.The actual number of embedded bits in one block was 3640 bits because of the error correcting code.Thus, the overall hiding capacity for each IHC standard image (4608 × 3456) was 87,360 bits (3640 × 24).However, it should be noted that the amount of watermark information that needs to be embedded was 200 bits.
As mentioned in the Introduction, the highest image quality test included tolerance, i.e., JPEG compression and cropping tests.We need a robust watermarking scheme that has a good tradeoff of robustness and imperceptibility.Thus, we described how the BCH code can be used to satisfy the IHC criteria based on a specific example.For the IHC standard image, we selected ECC parameters with good balance (quality and tolerance).

Experimental Results
In total, six IHC standard images that each comprised 4608 × 3456 pixels were used in the experiment.We used the [511,31] BCH code for the watermark and the [63,16] BCH code for the sync data, which obtained suitable error correction performance levels with 109 bits and 11 bits, respectively.
The 2D lifting-based discrete wavelet transform leads to a speed-up when compared to the standard implementation.Therefore, in this paper, we choose db2 (Daubechies wavelet of order 2) to use the Daubechies 4-tap filter.
According to the IHC evaluation criteria, there are two competition categories: highest tolerance and highest image quality.However, we focus on obtaining a solution to the highest image quality problem.
The image quality was evaluated in terms of the PSNR and the mean structural similarity (MSSIM) [25].The PSNR is a parameter that is used widely for evaluating image quality.The MSSIM is based on the characteristics of the human visual system, and it measures the structural similarity between two images.The MSSIM is equal to one if two images are identical.In the present study, the MSSIM measure used the following parameter settings: K 1 = 0.01, K 2 = 0.03.Table 3 shows the results for the highest image quality obtained by the DCT and DWT approaches, including the average compression ratio, PSNR value and MSSIM value.As shown in Table 3, the DCT approach using the best position performed best, although all of the approaches satisfied the criteria.Table 3.Average compression ratio, peak signal-to-noise ratio (PSNR) and mean structural similarity (MSSIM) value for the highest image quality.The term "DCT(old)" refers to our previous method [22].The terms "DCT(new)" and "DWT" refer to the methods using the best positions in the frequency domains.4 shows the average error rates for 10 HDTV-size areas after the second decompression.The watermarks should be sufficiently tolerant, such that they can be detected in no less than 200 bits in each cropped image.Table 5 shows the cropping positions used in this experiment.
According to the IHC evaluation criteria, the compression ratio should be less than 1 15 (=0.0667) after the first coding and 1 25 (=0.04) after the second coding.The PSNR should be higher than 30 dB for the luminance signal.

Figure 1 .
Figure 1.Diagram of our overall watermarking system.

Figure 2 .
Figure 2. The actual embedded bits are comprised of sync bits and the watermark codeword.

Fig. 1 2
-D discrete cosine transform n The shaded elements correspond to the target of comparison for 1 bit embedding.Ex) One block of size 960 540 ( ) It can embed 4020 bits into one embedding block.

Figure 3 .
Figure 3. Embedding approach based on the difference of pairwise DCT/DWT coefficients.

Figure 4 .
Figure 4. Statistical analysis based on the difference of pairwise DCT/DWT coefficients.
DCT, 52 for DWT st : for sync bits, for watermark

Figure 5 .
Figure 5. Block diagram showing the embedding process.

Figure 6 .
Figure 6.Block diagram showing the extraction process.

Table 1 .
Number of correctable errors in the BCH code for n = 63.

Table 2 .
Number of correctable errors in the BCH code for n = 511.

Table 4 .
Average error rates for 10 HDTV-sized areas after the second decompression (%) of the highest image quality.

Table 5 .
Cropping positions used in the IHC evaluation criteria.