The Effect of Wavelet Families on Watermarking Evelyn Brannock, Michael Weeks, Robert Harrison Department of Computer Science, Georgia State University, Atlanta, GA, USA Email: {evelyn, mweeks, rharrison}@cs.gsu.edu Abstract— With the advance of technologies such as the Internet, Wi-Fi Internet availability and mobile access, it is becoming harder than ever to safeguard intellectual property in a digital form. Digital watermarking is a steganographic technique that is used to protect creative content. Copyrighted work can be accessed from many different computing platforms; the same image can exist on a handheld personal digital assistant, as well as a laptop and desktop server computer. For those who want to pirate, it is simple to copy, modify and redistribute digital media. Because this impacts business profits adversely, this is a highly researched field in recent years. This paper examines a technique for digital watermarking which utilizes properties of the Discrete Wavelet Transform (DWT). The digital watermarking algorithm is explained. This algorithm uses a database of 40 images that are of different types. These images, including greyscale, black and white, and color, were chosen for their diverse characteristics. Eight families of wavelets, both orthogonal and biorthog- onal, are compared for their effectiveness. Three distinct watermarks are tested. Since compressing an image is a common occurrence, the images are compacted to determine the significance of such an action. Different types of noise are also added. The PSNR for each image and each wavelet family is used to measure the efficacy of the algorithm. This objective measure is also used to determine the influence of the mother wavelet. The paper asks the question:“Is the wavelet family chosen to implement the algorithm of consequence?” In summary, the results support the concept that the sim- pler wavelet transforms, e.g. the Haar wavelet, consistently outperform the more complex ones when using a non-colored watermark. Index Terms— watermark, digital watermarking, image wa- termarking, wavelet, discrete wavelet transform, I. I NTRODUCTION In the past, the U.S. has attempted to utilize copyright and trademarking law to protect creative digital content. However, legal means have not proven to be sufficient, and it can be an almost impossible task to hold the ownership of these works in the author’s control and curb the illegal theft of these labors. Watermarks embed a symbol of the owner of the works into the item itself, still allowing innocent consumers to continue to enjoy creative content. However, the hope is that the capability to identify those who nefariously copy, for example, music files from a CD to sell on the black market, can This paper is based on “Watermarking with Wavelets: Simplicity Leads to Robustness,” by E. Brannock, M. Weeks, and R. Harri- son, which appeared in the IEEE Proceedings SoutheastCon 2008, Huntsville, AL, USA, April 2008. c 2007 IEEE. be identified, and perhaps more successfully prosecuted. Businesses lose unknown profits from those who are willing to inexpensively reproduce artistic digital data, such as movies on DVDs and music on CDs in great volumes and instantaneously distribute worldwide to sell, without the right to do so. Therefore, creators and owners of the work are concerned that unauthorized copying and redistribution of their copyrighted works causes their economic returns to decline. As a result it has become of more significant consequence to study and find the most effective approaches to solve this problem. Watermarks serve to identify the source of the content and thus aid in investigating abusive duplication. Obviously, it is vital that the identifying marks which unassailably establish the true owner of the data are legible and identifiable: otherwise what is the use of embedding these proprietorships? Therefore, the impact of the size and nature of the data on the robustness of the embedded watermark will be investigated, in an extension of [1]. For the purposes of this study, an uncomplicated key will be used. However, as in other cryptographic systems, for commercial applications it should be large enough to make hacking attempts as unachievable as possible. Also, the effect of extensive search attacks on the watermark will be given a detailed examination. In this paper, the next section will cover the background and digital watermarking principles, section III will cover wavelets, and then section IV will discuss the method used. Section V presents results, and section VI concludes the paper. II. DIGITAL WATERMARKING A. Definition A digital watermark is “a digital code unremovably, robustly, and imperceptibly embedded in the host data and typically contains information about origin, status, and/or destination of the data”, according to Hartung and Kutter [2]. It is a form of steganography, because it hides the embedded data, often without the knowledge of the viewer or user. Since the purpose of steganography is the secret communication between two persons, the watermark can be considered to have been successfully attacked if its existence is determined. When contrasting with steganography, watermarks add the property of ro- bustness, which is the ability to withstand most common attacks [1]. The two common categories of attacks are 554 JOURNAL OF COMPUTERS, VOL. 4, NO. 6, JUNE 2009 © 2009 ACADEMY PUBLISHER