Research of Spatial Domain Image Digital Watermarking Payload
© Mao Jia-Fa et al. 2011
Received: 26 July 2010
Accepted: 21 February 2011
Published: 14 March 2011
Watermarking payload is a topic in which the watermarking researchers have a great interest at present. Based on the constraint of "perceptual invisibility," this paper makes a study of the maximum watermarking payload of spatial domain image, which is related to not only embedding intensity, but also to factors such as the size of image, image roughness and visual sensitivity, and so forth. The correlation among the maximum payload and the embedding intensity and size of an image is theoretically deduced through the objective estimation indicator of the peak signal to the noise rate (PSNR) while the relationship model among watermarking payload and image roughness and visual sensitivity is deduced through effective experiments designed on the basis of subjective estimation indicators. Finally, taking all these relationship models into account, this paper proposes a watermarking payload estimation method and verifies its effectiveness through experiments.
The research on technologies of information hiding and digital watermarking has developed for nearly twenty years. Information hiding is applied to covert communication, and digital watermarking is applied to copyright protection. They share one feature in common: When some data are embedded into the carrier data, no obvious damage is caused. Therefore, the key point of information hiding and digital watermarking is the same and that's what is called information hiding in a broad sense . However, differences in their application environments result in different research emphases and requirements. Information hiding emphasizes on the resistance to steganalysis attacks while digital watermarking stresses the perceptual invisibility.
The existing research literature about information hiding capacity has established theoretical models for information hiding and drawn different capacity expressions for different models. Moulin and O'Sullivan  proposed an information hiding model by abstracting the process of information hiding and using the communication model to represent information hiding. The information hiding capacity is considered as the maximum of reliable transfer rate under the communication model. However, this abstract model is not suitable for the still image information hiding model and cannot be applied to estimate the spatial domain image steganographic capacity. Supposing that the carrier information is state traverse, Cohen and Lapidoth  provided the estimating range for information hiding capacity. But in reality, not all the image carriers are state traversed. Though the research of Somekh-Baruch and Merhav  is an advance for the Moulin model, it is still limited to the communication model. Reference  proposed a secure steganographic method based on the payload and analyzed the correlation between image complexity and payload, but this research is confined to the DCT domain and the payload of spatial domain format is not involved. References [6, 7] made an analysis of information hiding capacity by introducing the case theory, but this research can only be made when the carriers follow the Gaussian distribution.
This paper aims to make a research on the digital watermarking payload. Digital watermarking manages to embed secret information into the carrier data without affecting the use of carrier or arousing visual suspect. Once the watermarked carrier is suspected to have carried secret information, watermarking fails. The most direct constraint for watermarking is "perceptual invisibility." When still images are used as the host image, the perceptibility is subject to subjective identification. The most direct reason for changes in perceptibility is the payload of the image. Given an image which has a certain size, if the watermarking algorithm is fixed, the maximum payload is also fixed. As a result, what the watermarking researchers are interested in recently is the maximum payload of still images under the constraint of "perceptual invisibility" .
Based on the constraint of "perceptual invisibility", this paper makes a study of the maximum digital watermarking payload of the spatial domain grayscale image. Factors restricting the maximum payload are not only internal but also external. The external factors are size of an image, embedding intensity, and so forth. while the internal factors are image roughness, visual sensitivity, and so forth. As is evident, just like a reservoir, the larger the image is, the larger the payload is. On the contrary, the greater the embedding intensity is, the smaller the payload. For instance is, to spatial domain embedding with the same embedding rate of 1 bpp (bits per pixel), higher bits embedding is more perceptible than lower bits embedding because changes in higher bits produce far more noise than those in lower bits embedding do. Different degrees in roughness result in different perceptibility because while it is difficult for naked eyes to identify the subtle changes in a highly rough image, it is easy to identify those changes in a smooth image [8–11]. The sensitivity of naked eyes to change in different images is varied, which is affected by brightness, image contrast, and so forth of the images. This paper carries on a research on the correlation between the payload and these factors, provides the payload estimation methods and verifies its applicability through experiments.
This paper is organized as follows. The external factors influencing the payload are discussed in Section 2. The internal factors influencing payload are elaborated on in Section 3. Section 4 introduces the subjective and objective estimation systems for perceptibility. In Section 5, the correlation between payload and the internal and external factors is discussed theoretically. Section 6 is devoted to the experiments and the testing results. The summary and future work are provided in Section 7.
2. External Factors Influencing Payload
Under the constraint of "perceptual invisibility," the external factors influencing the payload are mainly the size of an image and the embedding intensity. The size of the image is in direct proportion to the payload. It is like a reservoir; the larger the pool is, the larger the payload is. To study the influence of embedding intensity on watermarking payload, some knowledge about the digital watermarking embedding method should be introduced first.
The traditional image information hiding can be divided into two categories: spatial domain information hiding and transform domain (such as the DCT transform domain, the wavelet transform domain, etc.) information hiding . Most watermarking methods in spatial domain embed the watermarking information directly into the original image information, such as embedding the watermarking information into the least significant bit (LSB) plane [13–15] of the original image.
Here, and refer to pixel values of the watermarked image and the clean image, respectively; refers to the secret information embedded; refers to the embedding intensity. In the LSB embedding, the value of in the first part of formula (1) is −1, 0 or 1. When the value of is very large, the embedded information causes great image distortion. Thus, the perceptibility is changed and embedding fails. To have a better understanding of the image payload, the definition of embedding intensity is introduced.
Definition 1 (Embedding intensity).
Embedding intensity means to embed the secret information bit stream from a certain bit plane of the image, and if the secret information bit stream is not finished when this bit plane is full, it can be embedded into the higher bit plane until it is finished.
This paper grades the embedding intensity into eight levels, namely, . When , the embedding begins from the first bit plane (also known as the least significant bits) line by line. If there is more secret information bit stream to be embedded, it can be embedded into the higher level until it is finished. While , the secret information bit stream is embedded from the 2nd bit plane. Similarly, it is embedded into the higher level until the secret information bit stream is finished. By inference, while , the watermark bit stream is embedded into the highest bit plane of the image.
The payload of an image is related to its embedding intensity. Under the constraint of "perceptual invisibility," it is obvious that when , the image has the largest payload. The reason why the payloads under different embedding intensities are researched is that when , it is actually an LSB watermarking method, for which the current watermarking analysis method is very effective. To avoid attacks on LSB, the watermarking researchers choose different embedding intensities to embed the secret information.
Generally speaking, improving the embedding intensity can increase the resistance capacity and robustness of smoothing, slightly recompression, Gaussian low-pass filtering, and LSB steganlysis attacks. However, the robustness of sharpen; geometric transform attacks cannot be strengthened. Therefore, robustness is not wholly decided by embedding intensity. This article is only an embedding payload reference to the watermarking researchers. According to this purpose, we do the research of the upper limit of embedding payload. The aim of this paper is to provide payload reference for watermarking researchers. To achieve this purpose, this paper studies the maximum payloads under different intensities.
3. Internal Factors Influencing Payload
Under the constraint of "perceptual invisibility," the internal factors influencing the payload are mainly the two factors of image roughness and visual sensitivity.
3.1. Image Roughness
Visual perceptibility of changes in image is not only related to variation but also to roughness of the image, just like when a smooth surface is stained, it is easy to identify but when the surface is rough, it is difficult to identify the stain. Therefore, the maximum payload of an image is closely related to the image itself.
3.1.1. 2D Histogram
3.1.2. Measurement Indicators of Roughness
3.2. Visual Sensitivity
Perceptibility change is directly related to the human visual system which is generally called visual sensitivity. The sensitivities of human visual system towards low brightness and high brightness are different. However, the human visual system is a complex biological system which has three stages of perception: encoding, representation, and comprehension . There are many factors restricting the perceptibility of human's visual system. For instance, Mach bands phenomenon is a case in which a target is influenced by its surroundings and produces different perceptions. This phenomenon shows that brightness is not the monotonous function of visual sensitivity, that is, visual sensitivity is not only influenced by brightness but also by contrast of background. As a result, the perceptibility change caused by watermarking is closely related to the image contrast and brightness of the image.
3.2.1. Brightness and Contrast
3.2.2. Measurement Indicators for Visual Sensitivity
Image roughness and visual sensitivity of the sample images.
3.3. Relationship between Image Roughness and Visual Sensitivity
It can be concluded from Sections 3.1 and 3.2 that image roughness is related to visual sensitivity. From the perspective of visual sensitivity, the visual sensitivity model (Figure 3) is not only related to the photo response of cone and rod, but also related to the image contrast which is based on the image content. From the perspective of image roughness, its value is completely dependent on the image content. Thus, image roughness is related to visual sensitivity.
4. The Estimation System of Image Visual Perceptibility
There are two estimation systems for image visual perceptibility: one is subjective, and the other is objective. According to the criteria of digital image processing , this paper adopts the perception rank for the subjective standard and PSNR for the objective standard to measure the distortion of the image.
4.1. Subjective Estimation
4.2. Objective Estimation
The amount of information of a arbitrary host image is defined as , which is a fixed value. The variation of the image is only related to the MSE . The more data the watermarking researchers embed, the larger the MSE is and the smaller the PSNR is. In such a situation, the watermarked image can be perceived more easily. On the contrary, when the data embedded is smaller, the MSE is smaller, the PSNR is larger, and the watermarked image is less likely to be perceived.
Generally, the change in the image is imperceptible  when . But can it be concluded that when , the images change is not perceptible? The answer is no because it is closely related to the internal factors (mainly the image roughness and visual sensitivity). For example, suppose that two images have different contents but the same variation, and then their PSNR values are the same. But it can happen that the change in one image is perceptible and the change in the other is not. However, for the same image, its imperceptible minimum PSNR is fixed. Hence, to the same image, PSNR is a criterion for both the visual perceptibility and the payload.
5. Analysis of Payload
The maximum payload of a given image under the constraint of perceptual invisibility is one of the main concerns for the watermarking researchers. From another perspective, what kind of image should be chosen as the carrier to hide a certain amount of watermarking is also the concern of the watermarking researchers. Both these two problems are related to payload.
Maximum payload refers to the maximum payload of the carrier under a certain constraint. Based on the constraint of "perceptual invisibility," maximum payload refers to the higher limit of watermarking data embedded into the image. If exceeding this limit, the watermarked image is perceived by the observer, that is, the observer discovers the change in the image quality, which is unbearable for the watermarking researchers because it means failure of the watermarking algorithm. But of course, the perception of this kind of change happens in the situation when the observer has the original host image.
From the analysis above, it can be concluded that the payload is not only related to embedding intensity but also to the factors such as the size of the image, roughness and visual sensitivity, and so forth.
5.1. Relation between Payload and Embedding Rate
To obtain the maximum payload of the image, the relation between the embedding rate and embedding intensity, roughness and sensitivity should be obtained first. In the next section, the influence of embedding intensity on embedding rate is analyzed with the objective estimating system.
5.2. Relation between Embedding Rate and Embedding Intensity
To give a clear description of the relation between embedding rate and embedding intensity, the concept of embedding factor is introduced.
Definition 2 (Embedding factor).
Embedding factor means to embed secret information bit stream only into a single bit plane of the image. For example, if the secret information bit stream is only embedded into the first bit plane, then . If it is only embedded into the second bit plane, then .
The method above is used when "the maximum MSE of visual imperceptibility" is clearly known. But in reality, the maximum mean square error of visual imperceptibility of an image is difficult to get beforehand because it is related to image roughness and visual sensitivity. Therefore, the relation between the maximum embedding rate and image roughness and visual sensitivity is deduced through subjective estimation (the MSE belongs to objective estimation) in the next section.
6. Experimental Derivation and Verification
To effectively estimate the payload of images under the constraint of perceptual invisibility in the carriers, this paper conducts an experiment to find the relation between payload and image roughness and visual sensitivity. Before the experiment, we make preparations as follows.
6.1. Data Preparation for Experiments
To deduce the relation between payload (or embedding rate) and image roughness and visual sensitivity, 300 various images have been collected, among which, 150 BMP images are downloaded from an image database  and 150 are classical images taken by the author with digital cameras which are often used in image treatment. To make the data models universal and reasonable, in the experimental images, there are simple images without any detail and images containing great details; there are images of mountains, rivers, people, animals, plants, and so forth. All the images are treated by using the ACDSee image treatment software, the colorful ones transferred into gray ones, non-BMP images transferred into BMP ones, and all of them are cut into sizes of . These images constitute clean image data. Figure 2 is a cover image of this specification.
6.2. Determination of Experiment Project
The aim of this paper is to estimate the maximum payload under the constraint of perceptual invisibility in the carriers. The payload is not only related to the image size and embedding intensity, but also to image roughness and visual sensitivity. We have discussed both the relation between the maximum payload and the image size and that between the embedding rate and the embedding intensity, and obtained the calculating formula (21) for maximum the embedding rate. Thus, the key to studying the payload is to study the relationship model of the embedding rate and the image roughness, visual sensitivity, for which the following two steps are of vital importance.
(1)The watermark method of increasing the payload dynamically. This watermark method means to increase the payload constantly in the process that the observer judges whether any visual perceptibility has happened. According to (1), we designed a watermark method which can change the embedding intensity . Given a certain , watermark information bit steam begins to be embedded from the th bit plane. When is embedded to full, there is no visual perceptibility happening in the image. Then, continue to embed from level , the watermark embedding will not stop until visual perceptibility happens in the image. Figure 6 is the watermark-image of different payload (or embedding rates) when the embedding intensity .
(2)Deciding the embedding intensity. When it is full embedding, the following can be worked out: ( ) , ( ) , ( ) . From these data we can see that when it is only embedded into the first bit plane (LSB embedding method), its PSNR is far higher than 40, which is to say naked eyes can hardly perceive the changes in the image. But from the 2nd bit plane, PSNR is lower than the secure value of 40, and the watermarked image may be perceived. When first, second, and third bit plane are all embedded with secret information, its PSNR is 37.9189, and then the possibility of its being perceived is greater. But this is only the possibility of being perceptible, whether it is really perceptible is closely related to image roughness and visual sensitivity. Since when only the first bit plane is embedded with information, its PSNR is far higher than the secure value of 40, it can be concluded that whether the first bit plane is embedded with information or not exerts little influence on visual perceptibility of the image. Therefore, this paper makes a research on the maximum payload (or maximum embedding rate) from level 2, that is, when .
6.3. Experiment of Estimating Maximum Payload
using the actual embedding rate of the 200 images in experiments and the minimum mean square error of the embedding rate estimated in (27) as the constraint, we obtain that constants , , , , , . Making use (28), we can get the maximum embedding rate of the image when the embedding intensity . On the basis of this maximum embedding rate, how to work out the maximum embedding rate under various embedding intensities?
To work out the maximum embedding rate under various embedding intensities, the mean square error is still used as the transition. Suppose that the maximum embedding rate of an image when the embedding intensity is obtained as by using (28), then the maximum mean square error can be worked out according to method 2, which is described as follows.
When the maximum mean square error is obtained, the method in Section 5.2 can be made use of to work out the maximum embedding rate under various embedding intensities. Then, the maximum payload can be worked out by using (20).
6.4. Testing Results
The five images actual and estimated maximum payload in Figure 1.
In the recent twenty years, the technology of information hiding has been widely applied to fields of copyright protection (digital watermarking), communication, and so forth. At present, most researches focus on how to embed information without visual distortion and there have been few researches on the maximum payload, that is, the maximum payload under the constraint of perceptual invisibility.
This paper proposes the estimation method for the maximum payload. The maximum payload is influenced not only by internal but also external factors. The external factors are mainly the image size, embedding intensity, and so forth while the internal factors are mainly the image roughness, visual sensitivity, and so forth. The size of image is in direct proportion to the payload while the embedding intensity is in inversely proportional to the payload because higher bits embedding generates more noise than lower bits embedding does and the noise is the normalized indicator of image distortion. Different degrees in roughness result in different perceptibility because while it is difficult for the human eyes to identify the subtle changes in a highly rough image, it is easy to identify such changes in a smooth image. The sensitivity of human eyes to changes in different images is varied, which is affected by image contrast and brightness. The correlation between the maximum payload and the embedding intensity and size of image is theoretically deduced through the objective estimation indicator of the peak signal to noise rate (PSNR) while the relationship model between watermarking payload and image roughness and visual sensitivity is deduced through effective experiments designed on the basis of subjective estimating indicators. Finally, taking into account of all these relationship models, this paper proposes the watermarking payload estimation method and verifies its effectiveness through experiments.
Table 4 summarizes both the estimation methods we have proposed before and the methods proposed in the previous literatures, which can be generalized as follows.
(1)Most references [3–5, 7] abstracted information hiding into a Communication Theory Model and draw different payload expressions from different models. However, this kind of abstraction of models can only act as a theoretical guide for hiding information capacity estimation of the real objective images and is not very much contributive to the accomplishment of the project. The estimation method proposed for hiding capacity estimation of the real objective images is more contributive to the Engineering Application.
(2)Reference  proposed a secure estimation method for steganographic capacity based on the DCT domain. It only proves the influence of image complexity on payload by doing some experiments but has not worked out the specific capacity estimation method.
(3)These references have not reported the deviation rate between the estimated value and the actual value. But this paper proves the effectiveness of our way of estimation through experimental tests.
Summarization for previous work and our proposed method.
Number of factors
Payload estimated method
Minimum error rate
There are still shortcomings in our method and further research is still needed to improve the estimating accuracy.
(1)The method is rough. This paper makes a study of the maximum watermarking payload of spatial domain image under the conditions of invisibility, in another word, the maximum embedding payload. Different area has the different payload capacity. For example, the payload of high roughness and perceptual invisibility areas is higher than the area of low roughness and visual sensitive areas. This article does not do further research of this aspect; it is the deficiency of this article and also further research directions of ours, which is closer to the practical applications.
(2)The experimental plan lacks novelty. Since evaluation of visual perceptibility in images is needed in the experiments, it costs much time of the experts. In the future work, better plans will be designed to save the experts time and to improve accuracy in estimating.
The authors thank the postgraduates in Information Security Center of Beijing University of Post and Telecommunication for their precious time devoted to the experimental evaluation in this paper. This work is supported by the National Basic Research Program of China (973 Program) (2007CB311203), the National Natural Science Foundation of China (no. 60821001), the Specialized Research Fund for the Doctoral Program of Higher Education (no. 20070013007) and the 111 Project (no. B08004), and the Shanghai Municipal Education Committee Scientific Research Innovation Project (no. 11YZ284).
- Niu XX, Yang YX: Study on the frame of information steganography and steganalysis. Acta Electronica Sinica 2006, 34: 2421-2424.Google Scholar
- Moulin P, O'Sullivan JA: Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory 2003, 49(3):563-593. 10.1109/TIT.2002.808134MathSciNetView ArticleMATHGoogle Scholar
- Cohen AS, Lapidoth A: The Gaussian watermarking game. IEEE Transactions on Information Theory 2002, 48(6):1639-1667. 10.1109/TIT.2002.1003844MathSciNetView ArticleMATHGoogle Scholar
- Somekh-Baruch A, Merhav N: On the capacity game of public watermarking systems. IEEE Transactions on Information Theory 2004, 50(3):511-524. 10.1109/TIT.2004.824920MathSciNetView ArticleMATHGoogle Scholar
- Sajedi H, Jamzad M: Secure steganography based on embedding capacity. International Journal of Information Security 2009, 8(6):433-445. 10.1007/s10207-009-0089-yView ArticleGoogle Scholar
- Gao HY: The theory and application of audio information hiding, PH.D. dissertation. Beijing University of Posts and Telecommunications, Beijing, China; 2006.Google Scholar
- Chandramouli R, Memon ND: Steganography capacity: a steganalysis perspective. In Security and Watermarking of Multimedia Contents, 2003, Santa Claru, Calif, USA, Proceedings of SPIE. Volume 5020. Springer; 173-177.
- Ll S, Zhang XP, Wang SZ: Digital image steganography based on tolerable error range. Journal of Image and Graphics 2007, 12(2):212-217.Google Scholar
- Noda H, Spaulding J, Shirazi MN, Kawaguchi E: Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Processing Letters 2002, 9(12):410-413. 10.1109/LSP.2002.806056View ArticleGoogle Scholar
- Wu DC, Tsai WH: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 2003, 24(9-10):1613-1626. 10.1016/S0167-8655(02)00402-6View ArticleMATHGoogle Scholar
- Zhang X, Wang S: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters 2005, 12(1):67-70.View ArticleGoogle Scholar
- Katzenbeisser S, Petitcolas FA: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Press, Norwood, Mass, USA; 2000.Google Scholar
- Bender W, Gruhl D, Morimoto N, Lu A: Techniques for data hiding. IBM Systems Journal 1996, 35(3-4):313-335.View ArticleGoogle Scholar
- Nikolaidis N, Pitas I: Robust image watermarking in the spatial domain. Signal Processing 1998, 66(3):385-403. 10.1016/S0165-1684(98)00017-6View ArticleMATHGoogle Scholar
- Chen TS, Chang CC, Hwang MS: A virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing 1998, 7(10):1485-1488. 10.1109/83.718488MathSciNetView ArticleMATHGoogle Scholar
- Cohen AS, Lapidoth A: The capacity of the vector Gaussian watermarking game. Proceedings of the IEEE International Symposium on Information Theory (ISIT '01), June 2001 5.Google Scholar
- Zhang X, Wang S: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters 2006, 10(11):781-783.View ArticleGoogle Scholar
- Qu ZG, Fu Y, Niu X, Yang Y, Zhang R: Improved EMD steganography with great embedding rate and high embedding efficiency. Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09), September 2009, Tokyo, Japan 348-352.Google Scholar
- Lie WN, Lin GS: A feature-based classification technique for blind image steganalysis. IEEE Transactions on Multimedia 2005, 7(6):1007-1020.View ArticleGoogle Scholar
- Jain AK: Fundamentals of Digital Image Processing. Person Education, Inc., Publish as Prentice Hall; 1989.MATHGoogle Scholar
- Yang CH, Weng CY, Wang SJ, Sun HM: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security 2008, 3(3):488-497.View ArticleGoogle Scholar
- Hall EL: Survey of preprocessing and feature extraction techniques for radiographic images. IEEE Transactions on Computers 1971, 20(9):1032-1044.View ArticleGoogle Scholar
- Delaigle JF, Devleeschouwer C, Macq B, et al.: Human visual system features enabling watermarking. Proceedings of IEEE International Conference on Multimedia and Expo, 2002, Lusanne, Switzerland 489-492.
- Chan CK, Cheng LM: Hiding data in images by simple LSB substitution. Pattern Recognition 2004, 37(3):469-474. 10.1016/j.patcog.2003.08.007View ArticleMATHGoogle Scholar
- Ker AD: A capacity result for batch steganography. IEEE Signal Processing Letters 2007, 14(8):525-528.View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.