© 2000 Eastman Kodak Company Data Embedding Using Phase Dispersion Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA Abstract A method of data embedding based on the convolution of message data with a random phase carrier is presented. The theory behind this method is reviewed and it is shown that the technique can be used to hide both pictorial and non-pictorial data. The details of the procedures used for carrier design, message template optimization, message extraction optimization, block synchronization, and rotation and scale correction are discussed. Finally, the algorithm’s benchmark results using Stirmark are presented. 1. Introduction An important aspect of our technique is that it can be used to embed either a grayscale iconic image or binary data. Examples of iconic images are trademarks, corporate logos or other arbitrary small images. Since the algorithm performance generally decreases as the message energy increases, it is preferable to use the edge maps of an icon as a message as shown in Figure 1a. When embedding binary data, the one and zero bits are represented by positive and negative delta functions that are placed in predefined and unique locations across the message image (referred to as the message template) as shown in Figure 1b. Common examples of binary data are the 32-bit representations of URL’s or copyright notices. Figure 1. Examples of iconic and binary message images The following notation is adopted throughout this paper. The original image is represented by the two dimensional array, I(x,y) the watermarked image (the image containing the embedded data) by I’(x,y), the message image by M(x,y), the carrier image by C(x,y), and the message template by T(x,y). With these definitions, the message embedding process is defined by the following equation: ) , ( )) , ( ) , ( ( ) , ( y x I y x C y x M y x I * α = Eq. (1) where the symbol, * , represents cyclic convolution and α is an arbitrary constant chosen to make the embedded message simultaneously invisible and robust to common processing. From Eq. (1) it is clear (a) Example of a 128x128 binary iconic message (b) Example of a 64-bit binary message comprising of 1’s (white) and 0’s (black)