robustness. The parameter of the algorithm that
defines the number of watermarked coefficients also
controls the robustness versus security performance
of the encoding process. Several experimental
results show that the watermarked images are robust
to a variety of image processing operations and
geometric transformations. The rest of the paper is
organized as follows: section 2 provides a brief
introduction to pseudorandom noise sequences and
section 3 determines the coefficients of the
frequency domain where the method is applied as
well as the parameters that control the performance
of the embedding method. Sections 4 and 5 present
the embedding and the detection algorithm,
respectively. Section 6 provides some experimental
results while section 7 concludes the paper.
2 PSEUDORANDOM NOISE
SEQUENCES
The watermark is embedded in the form of a
pseudorandom noise (PN) sequence. (PN) sequences
are binary sequences that appear to be statistically
random and have properties similar to random
sequences generated by sampling a white noise
process. (PN) sequences are generated by
pseudorandom number generators using an initial
seed (key). There are several such utilizations
including GoldCodes, m-sequences, Legendre
sequences and perfect maps (O’Ruanaidh, 1998).
Different keys produce different sequences thus,
unless the algorithm and key are known, the
sequence is impractical to predict. If the key consists
of K registers then a sequence is a maximal length
sequence if it has length 2
K
−1. Maximal length
sequences have pseudo-randomness properties i.e.
over one period, there are 2
K−1
ones and 2
K−1
−1 zeros
(Luby, 1996). Moreover, the autocorrelation
function is binary valued. Specifically, for a
sequence p
1
p
2
…p
N
of period N the autocorrelation
function, R
xx
(k), is
∑
=
+
′′
=
N
n
kiixx
pp
N
kR
1
1
)(
(1)
where
i
p
′
=1−2p
i
and k represents the k-th shifted
version of the sequence. The value of R
xx
(k) equals 1
if k=0 and −1/N otherwise. In other words, the
sequence produced by the generator is uncorrelated
to all of its circular shifts for k≠0.
Let us suppose that a watermark W is a binary
message b
1
b
2
… b
L
consisting of L bits. Each
symbol b
i
is encoded to a zero mean pseudorandom
vector of length N. Since there are two states for
each symbol b
i
, therefore two (PN) sequences of
length N are used, the first one corresponding to
state 0 and its complementary to state 1.
Corresponding each symbol b
i
to its (PN)
sequence produces the spread spectrum encoded
watermark W
s
which is a binary sequence of length.
L
s
=NL (2)
The spread spectrum version W
s
of the
watermark forms a symmetric key cryptosystem
since in order to embed or extract the watermark, it
is necessary to know the key used to generate the
pseudorandom sequences.
3 THE 2D FOURIER
TRANSFORM
Let I(x,y) denote the original image defined on a
integer grid where 0≤x<N
x
and 0≤y<N
y
. The two
dimensional discrete Fourier transform (DFT) of I is
F(u,v)=
∑∑
−
=
−
=
−−
1
0
1
0
/2/2
),(
x
y
yx
N
x
N
y
NjvyNjux
eyxI
ππ
(3)
The watermark is embedded in the magnitude
M(u,v)=|F(u,v)| of the Fourier transform. Its phase
P(u,v)=∠ F(u,v) is not affected but only used during
the inversion of the 2D DFT.
Let us assume that the center of the 2D DFT
transform corresponds to the zero frequency term.
Let also R⊂M the set of coefficients where the
watermark is embedded. R corresponds to a ring
determined by radius r
1
and r
2
with 0<r
1
<r
2
<N
R
where N
R
=min{N
x
,N
y
}/2. The values for r
1
and r
2
must be chosen so that the image deformation
produced by the embedding process is minimal. The
most proper area to embed the watermark is the
middle frequencies of the spectrum since small
radius values affects the low frequencies leading to
visibly image distortions while high radius values
affect the higher frequencies that are most sensitive
to compression attacks (Cox, 1997). It is,
R = {M(u,v): r
1
≤
22
vu + ≤ r
2
}
(4)
In the proposed method the values of r
1
and r
2
are in
the range 0.5N
R
≤ r
1
, r
2
≤0.8N
R
The number L
R
of coefficients that satisfy equation
(4) is related to the difference between r
1
and r
2
. If
the coefficients are sorted according to angle
VISAPP 2007 - International Conference on Computer Vision Theory and Applications
122