|
1.IntroductionIn this paper, we propose a scheme of computer-generated hologram (CGH) watermarking resilient to rotation and scaling, based on the CGH, log-polar mapping (LPM), inverse LPM (ILPM), and the fast Fourier transform (FFT), as shown in Fig. 1. We have investigated some documents about holographic watermarking such as Refs. 1, 2, 3. They mainly emphasize the robustness of common signal-processing operations such as image compression, and they all have difficulty in dealing with geometrical attacks, especially rotation and scaling. Because computation of a rotation angle or scaling factor is very fragile to errors, a little imprecision will make the watermark hard to extract. In order to solve those problems, LPM is usually adapted to integrate it with the FFT, because the LPM algorithm can transform rotation and scaling into translation, and the amplitude of the FFT is translation-invariant.4 If we embed a CGH of the mark pattern into the LPM domain of a cover image, the geometrical attacks of rotation and scaling will be transformed into translation, and will not affect the twin image’s reconstruction from the image rotated and scaled. So the reconstruction of the twin image from the watermarked image can resist rotation and scaling. But when the lossy LPM algorithm is applied to the cover image, it will degrade the cover image’s quality. So we embed the ILPM of the CGH into the cover image instead of directly embedding the CGH into the LPM domain of the cover image. Therefore, our scheme can directly reconstruct the embedded information from the watermarked image after rotation and scaling, and the reconstructed twin image can be easily recognized. It avoids the registration step in the extracting procedure, without involving the calculation complexity of the rotation angle or scaling factor. It is a blind watermarking scheme resilient to rotation and scaling. 2.Computer-Generated Hologram and ReconstructionAccording to the off-axis hologram principle of Leith and Upatnieks,5 we can get the transmittance as where represents the object wave , and represents the reference beam . According to Eq. 1, we made a CGH [Fig. 2b] from the mark pattern , the Chinese character “guang” [Fig. 2a].In order to simulate the diffusion effect, should be multiplied by a random phase , i.e., thus , where indicates the discrete Fourier transform (DFT).According to the properties of the DFT, where are the dimensions of the mark pattern, and indicates the inverse DFT (IDFT).The reconstruction of Fourier hologram can be expressed as where indicates the real image , and indicates the virtual image . Figure 2c shows the twin image reconstructed from the CGH by the FFT; and are locates at symmetrical positions, determined by and .63.Log-Polar MappingThe log-polar mapping is defined as here is the corresponding point in the log-polar coordinates of the point in the Cartesian coordinates. LPM converts rotation and scaling in the Cartesian domain to translations in the log-polar domain, which can be expressed as4.Watermarking SchemeIn order to avoid the cover image’s quality loss caused by LPM, we embed the CGH’s ILPM into the cover image, so the embedding procedure can be expressed as where indicates the intensity of the cover image, indicates the intensity of the watermarked image, is the weighting factor of the watermark, is the function of the CGH made from the mark pattern [Fig. 2a], indicates log-polar mapping, and indicates inverse log-polar mapping.If is rotated by and scaled by , resulting in , then the reconstruction of the twin image from can be expressed as We can see that reconstructed twin image is resilient to rotation and scaling.5.Experimental AnalysisIn an experiment, the ILPM of the mark pattern’s CGH ( samples) was embedded into a cover image [Fig. 3a], and yielded the watermarked image [Fig. 3b, , PSNR=37.8612]. When the watermarked image [Fig. 3b] is rotated or scaled, the mark pattern’s twin image can be directly reconstructed by FFT from the LPM of the image rotated or scaled [Fig. 4a], not needing a registration step. When we adopt the method of Eq. 8 to reconstruct the information of the mark pattern, the cover image will go through the same procedure to produce redundant information; therefore we have to properly eliminate some noise and effectively enhance the contrast of the reconstructed twin image. It is well known that the ordinary image’s spectrum is concentrated in its low-frequency component , so we can select appropriate and to locate the information position of the twin image in the high-frequency domain, as shown in Fig. 4b, and eliminate the redundant information to enhance the contrast of the reconstructed twin image. As shown in Fig. 4c, we eliminated the redundant information and put the reconstructed real image and virtual image together in the reconstruction plane. We adopted the peak signal-to-noise ratio (PSNR) to evaluate the quality of the reconstructed twin image, and found that when the PSNR is larger than 12.00, the reconstructed twin image can be effectively recognized. To view the reconstructed twin image (PSNR=16.1378) in Fig. 4c, we found that when the image is scaled by 1.5 and rotated by [Fig. 4a], the information of “guang” is basically preserved and the shape of the reconstructed twin-image can be effectively recognized. We also did other, similar experiments, and found that this holographic watermarking method is robust to rotation through any angle and scaling by any factor from 0.5 to 2.0. 6.ConclusionIn this paper, we have established a scheme of CGH watermarking to resist the geometrical attacks of rotation and scaling, based on CGH, ILPM, LPM, and FFT. Through embedding the ILPM of a mark pattern’s CGH into a cover image, the twin image of the mark pattern can be effectively reconstructed from the watermarked image rotated and scaled, and the registration step in the extracting procedure can be avoided. The information position of the twin image is located in the high-frequency domain, and the redundant information of the low-frequency component is properly eliminated; thus the contrast of the twin image is effectively enhanced, and the information of the mark pattern is preserved well enough to be recognized. Although the LPM and ILPM algorithms caused some loss in image quality, the experimental result is acceptable. If the precision of LPM and ILPM algorithms is sufficiently improved, the experimental results will become better. This processing scheme has potential application in rotation- and scaling- resilient watermarking. ReferencesN. Takai and
Y. Mifune,
“Digital watermarking by a holographic technique,”
Appl. Opt., 41 865
–873
(2002). 0003-6935 Google Scholar
H. T. Chang and
C. L. Tsan,
“Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain,”
Appl. Opt., 1 536
–539
(2005). 0003-6935 Google Scholar
Y. Aoki,
“Watermarking technique using computer-generated holograms,”
Electron. Commun. Jpn., 84 21
–31
(2001). 0424-8368 Google Scholar
J. J. K. Ó Ruándidh and
Thierry Pun,
“Rotation, scale and translation invariant digital image watermarking,”
536
–539
(1997). Google Scholar
J. W. Goodman, Introduction to Fourier Optics, McGraw-Hill, New York (1968). Google Scholar
G. Yang and
H. Xie,
“An approach to compress information of computer-synthesis hologram with shape adaptive binary tree predictive coding and fast Fourier transform technique,”
IEEJ Electron. Inf. Systems, 125 99
–105
(2005). Google Scholar
|