Open Access
1 June 2007 Computer-generated hologram watermarking resilient to rotation and scaling
Min Liu, Guanglin Yang, Haiyan Xie, Mingyao Xia, Jianbin Hu, Hongbin Zha
Author Affiliations +
Abstract
We propose a new scheme of computer-generated hologram (CGH) watermarking to resist rotation and scaling. To embed the inverse log-polar mapping of a mark pattern's CGH into a cover image, the twin image of the mark pattern can be directly reconstructed by fast Fourier transformation from the log-polar mapping of the watermarked image after rotation and scaling, not requiring a registration step in the extracting procedure. In an experiment, the information position of the twin image is located in the high-frequency domain and the redundant information of the low-frequency component is properly eliminated, so the contrast of the twin image is appropriately enhanced and the basic information of the mark pattern is effectively preserved to be recognized. The experimental results show that the mark-pattern's information can be effectively reconstructed when the watermarked image is scaled by 0.5 to 2 or rotated by any angle, so this watermarking scheme is effectively verified by experiment.

1.

Introduction

In this paper, we propose a scheme of computer-generated hologram (CGH) watermarking resilient to rotation and scaling, based on the CGH, log-polar mapping (LPM), inverse LPM (ILPM), and the fast Fourier transform (FFT), as shown in Fig. 1.

Fig. 1

A scheme of CGH watermarking resilient to rotation and scaling.

060501_1_1.jpg

We have investigated some documents about holographic watermarking such as Refs. 1, 2, 3. They mainly emphasize the robustness of common signal-processing operations such as image compression, and they all have difficulty in dealing with geometrical attacks, especially rotation and scaling. Because computation of a rotation angle or scaling factor is very fragile to errors, a little imprecision will make the watermark hard to extract.

In order to solve those problems, LPM is usually adapted to integrate it with the FFT, because the LPM algorithm can transform rotation and scaling into translation, and the amplitude of the FFT is translation-invariant.4 If we embed a CGH of the mark pattern into the LPM domain of a cover image, the geometrical attacks of rotation and scaling will be transformed into translation, and will not affect the twin image’s reconstruction from the image rotated and scaled. So the reconstruction of the twin image from the watermarked image can resist rotation and scaling. But when the lossy LPM algorithm is applied to the cover image, it will degrade the cover image’s quality. So we embed the ILPM of the CGH into the cover image instead of directly embedding the CGH into the LPM domain of the cover image.

Therefore, our scheme can directly reconstruct the embedded information from the watermarked image after rotation and scaling, and the reconstructed twin image can be easily recognized. It avoids the registration step in the extracting procedure, without involving the calculation complexity of the rotation angle or scaling factor. It is a blind watermarking scheme resilient to rotation and scaling.

2.

Computer-Generated Hologram and Reconstruction

According to the off-axis hologram principle of Leith and Upatnieks,5 we can get the transmittance as

Eq. 1

h(x,y)=O(x,y)+R(x,y)2=A(x,y)exp[jφ(x,y)]+Rexp[j2π(αx+βy)]2=A(x,y)2+R2+2RA(x,y)×cos[2π(αx+βy)φ(x,y)],
where A(x,y)exp[jφ(x,y)] represents the object wave O(x,y) , and Rexp[j2π(αx+βy)] represents the reference beam R(x,y) . According to Eq. 1, we made a CGH [Fig. 2b] from the mark pattern W(p,q) , the Chinese character “guang” [Fig. 2a].

Fig. 2

(a) Mark pattern; (b) CGH of mark pattern; (c) twin image reconstructed from CGH. The image size is 256×256 pixels.

060501_1_2.jpg

In order to simulate the diffusion effect, W(p,q) should be multiplied by a random phase rand(p,q)(0,1) , i.e.,

Eq. 2

W(p,q)=W(p,q)exp[j2πrand(p,q)];
thus O(x,y)=A(x,y)exp[jφ(x,y)]=FW(p,q) , where F indicates the discrete Fourier transform (DFT).

According to the properties of the DFT,

3.

FA(x,y)exp[jφ(x,y)]=FFW(p,q)=1MNW(Mp,Nq),
FA(x,y)exp[jφ(x,y)]=F1MNF1W(p,q)=1MNW(p,q),
where M,N are the dimensions of the mark pattern, and F1 indicates the inverse DFT (IDFT).

The reconstruction of Fourier hologram can be expressed as

Eq. 4

Fh(x,y)=FA(x,y)2+R2+r(p,q)+v(p,q),
where r(p,q) indicates the real image (RMN)W(pαM,qβN) , and v(p,q) indicates the virtual image (RMN)W(MpαM,NqβN) . Figure 2c shows the twin image reconstructed from the CGH by the FFT; r(p,q) and v(p,q) are locates at symmetrical positions, determined by α and β .6

3.

Log-Polar Mapping

The log-polar mapping is defined as

5.

x=eucosθ,
y=eusinθ,
here (μ,θ) is the corresponding point in the log-polar coordinates of the point (x,y) in the Cartesian coordinates. LPM converts rotation and scaling in the Cartesian domain to translations in the log-polar domain, which can be expressed as

6.

(ρ,θ)(μ+logρ,θ),
(xcos(θ+δ)ysin(θ+δ),xsin(θ+δ)+ycos(θ+δ))
(μ,θ+δ).

4.

Watermarking Scheme

In order to avoid the cover image’s quality loss caused by LPM, we embed the CGH’s ILPM into the cover image, so the embedding procedure can be expressed as

7.

w(p,q)=ILPM[h(μ,θ)],
I(p,q)=I(p,q)+γw(p,q),
where I(p,q) indicates the intensity of the cover image, I(p,q) indicates the intensity of the watermarked image, γ is the weighting factor of the watermark, h(μ,θ) is the function of the CGH made from the mark pattern W(p,q) [Fig. 2a], LPM[] indicates log-polar mapping, and ILPM[] indicates inverse log-polar mapping.

If w(p,q) is rotated by δ and scaled by ρ , resulting in w(p,q) , then the reconstruction of the twin image from w(p,q) can be expressed as

Eq. 8

FLPM[w(p,q)]=FLPM{ILPM[h(μ+logρ,θ+δ)]}=Fh(μ+logρ,θ+δ)=Fh(μ,θ)=r(p,q)+v(p,q).
We can see that reconstructed twin image is resilient to rotation and scaling.

5.

Experimental Analysis

In an experiment, the ILPM of the mark pattern’s CGH ( 512×512 samples) was embedded into a cover image [Fig. 3a], and yielded the watermarked image [Fig. 3b, γ=0.3 , PSNR=37.8612]. When the watermarked image [Fig. 3b] is rotated or scaled, the mark pattern’s twin image can be directly reconstructed by FFT from the LPM of the image rotated or scaled [Fig. 4a], not needing a registration step.

Fig. 3

(a) Cover image; (b) watermarked image, γ=0.2 , PSNR=37.8612 . The image size is 512×512 pixels.

060501_1_3.jpg

Fig. 4

(a) The geometrically attacked watermarked image (scaled by 1.5 and rotated by 45deg ); (b) the positions of the low-frequency component l(p,q) and twin image [ r(p,q) and v(p,q) ]; (c) the reconstructed twin image, PSNR=16.1378 .

060501_1_4.jpg

When we adopt the method of Eq. 8 to reconstruct the information of the mark pattern, the cover image I(p,q) will go through the same procedure to produce redundant information; therefore we have to properly eliminate some noise and effectively enhance the contrast of the reconstructed twin image. It is well known that the ordinary image’s spectrum is concentrated in its low-frequency component l(p,q) , so we can select appropriate α and β to locate the information position of the twin image in the high-frequency domain, as shown in Fig. 4b, and eliminate the redundant information l(p,q) to enhance the contrast of the reconstructed twin image. As shown in Fig. 4c, we eliminated the redundant information and put the reconstructed real image and virtual image together in the reconstruction plane.

We adopted the peak signal-to-noise ratio (PSNR) to evaluate the quality of the reconstructed twin image, and found that when the PSNR is larger than 12.00, the reconstructed twin image can be effectively recognized. To view the reconstructed twin image (PSNR=16.1378) in Fig. 4c, we found that when the image is scaled by 1.5 and rotated by 45° [Fig. 4a], the information of “guang” is basically preserved and the shape of the reconstructed twin-image can be effectively recognized. We also did other, similar experiments, and found that this holographic watermarking method is robust to rotation through any angle and scaling by any factor from 0.5 to 2.0.

6.

Conclusion

In this paper, we have established a scheme of CGH watermarking to resist the geometrical attacks of rotation and scaling, based on CGH, ILPM, LPM, and FFT. Through embedding the ILPM of a mark pattern’s CGH into a cover image, the twin image of the mark pattern can be effectively reconstructed from the watermarked image rotated and scaled, and the registration step in the extracting procedure can be avoided. The information position of the twin image is located in the high-frequency domain, and the redundant information of the low-frequency component is properly eliminated; thus the contrast of the twin image is effectively enhanced, and the information of the mark pattern is preserved well enough to be recognized. Although the LPM and ILPM algorithms caused some loss in image quality, the experimental result is acceptable. If the precision of LPM and ILPM algorithms is sufficiently improved, the experimental results will become better. This processing scheme has potential application in rotation- and scaling- resilient watermarking.

Acknowledgment

This work was supported by NSFC Project 60429101.

References

1. 

N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt., 41 865 –873 (2002). 0003-6935 Google Scholar

2. 

H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain,” Appl. Opt., 1 536 –539 (2005). 0003-6935 Google Scholar

3. 

Y. Aoki, “Watermarking technique using computer-generated holograms,” Electron. Commun. Jpn., 84 21 –31 (2001). 0424-8368 Google Scholar

4. 

J. J. K. Ó Ruándidh and Thierry Pun, “Rotation, scale and translation invariant digital image watermarking,” 536 –539 (1997). Google Scholar

5. 

J. W. Goodman, Introduction to Fourier Optics, McGraw-Hill, New York (1968). Google Scholar

6. 

G. Yang and H. Xie, “An approach to compress information of computer-synthesis hologram with shape adaptive binary tree predictive coding and fast Fourier transform technique,” IEEJ Electron. Inf. Systems, 125 99 –105 (2005). Google Scholar
©(2007) Society of Photo-Optical Instrumentation Engineers (SPIE)
Min Liu, Guanglin Yang, Haiyan Xie, Mingyao Xia, Jianbin Hu, and Hongbin Zha "Computer-generated hologram watermarking resilient to rotation and scaling," Optical Engineering 46(6), 060501 (1 June 2007). https://doi.org/10.1117/1.2744330
Published: 1 June 2007
Lens.org Logo
CITATIONS
Cited by 7 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Computer generated holography

3D image reconstruction

Image enhancement

Image quality

Image registration

Associative arrays

Back to Top