- Research
- Open Access
- Published:

# High-capacity watermarking of high dynamic range images

*EURASIP Journal on Image and Video Processing*
**volumeÂ 2016**, ArticleÂ number:Â 3 (2016)

## Abstract

High dynamic range (HDR) imaging techniques address the need to capture the full range of color and light that the human eyes can perceive in the real world. HDR technology is becoming more and more pervasive. In fact, most of the cameras and smartphones available on the market are capable of capturing HDR images. Among the challenges posed by the spread of this new technology there is the increasing need to design proper techniques to protect the intellectual property of HDR digital media. In this paper, we speculate about the use of watermarking techniques to cope with the peculiarities of HDR media to prevent the misappropriation of HDR images.

## 1 Introduction

High dynamic range (HDR) imaging technologies provide a step forward in representing real scenes as they are perceived by the human eye. With respect to traditional imaging techniques capable of acquiring low dynamic range (LDR) images or video, HDR methodologies [1, 2] are capable of generating and rendering images and videos with a ratio between the luminance of the lightest and darkest areas far greater than the one provided by standard imaging technologies. It is evident that HDR media are richer in terms of content than their LDR counterparts and therefore much more valuable. It is therefore crucial to provide, since the early stages of the development of such technology, proper tools for protecting the intellectual property of digital HDR media. Data hiding, and more specifically digital watermarking [3â€“5], has emerged in the last decade as an enabling technology for copyright protection among other possible applications. Roughly speaking, data hiding is the general process by which a discrete information stream, the mark, is merged within media content by imposing imperceptible changes on the original host signal, while allowing the message to be detected or extracted even in the presence of either malevolent or non-intentional attacks. Other requirements, other than the transparency one, can be needed according to the specific application that is taken into account. Although LDR image or video digital watermarking is a very mature area of research, watermarking in an HDR scenario is still in its infancy and needs to be significantly developed. In this paper, we crystallize the state of the art on HDR image watermarking techniques and the watermarking embedding method proposed by the authors in [6] is more extensively tested using a wider set of images as well as up to date metrics for performance assessment.

A brief overview on digital watermarking is given in Section 2. An extensive and comparative review of the state of the art on HDR image watermarking is given is Section 3. The watermarking method is detailed in Section 4. An extensive set of experimental results is given in Section 5, and conclusions are drawn in Section 6.

## 2 Multimedia digital watermarking

In the past decades, there has been an explosion in the use and distribution of digital multimedia data, essentially driven by the diffusion of the Internet. In this scenario, data hiding and more specifically digital watermarking techniques [3, 4] have been proposed to address the ever-growing need to protect the intellectual property of multimedia content (digital still images, 2D and 3D video sequences, text, or audio) in the World Wide Web. Although copyright protection was the very first application of watermarking, different uses have been proposed in the literature. Fingerprinting, copy control, broadcast monitoring, data authentication, multimedia indexing, content-based retrieval applications, medical imaging applications, error concealment, quality assessment, and improved data compression are only a few of the applications where watermarking can be usefully employed. When these techniques are used to preserve the copyright ownership with the purpose of avoiding unauthorized data duplications, the embedded watermark should be detectable. This is required even if malicious attacks or non-malevolent signal processing (i.e., filtering and compression) are applied on the multimedia data. This requirement is known as *watermark security*. On the other hand, when the watermark is required to be resistant only to non-malicious manipulations, the watermarking techniques are referred to as *robust*. For some applications, when the robustness requirement is severely required, each attempt of removing the mark should result in irreversible data quality degradation. In some applications, the watermarked host data are intended to undergo a limited number of signal processing operations. Therefore, in the aforementioned scenario, the watermark needs to be robust only to a limited number of set of manipulations, in which case the technique is known as *semi-fragile watermarking*. On the contrary, when unwanted modifications of the watermarked data affect even the extracted watermark, the embedding scheme is known as *fragile*. Fragile watermarking can be used to obtain information about the tampering process. In fact, it indicates whether or not the data has been altered and supplies localization information as to where the data was altered. *Capacity* is another watermarking requirement, referring to the number of bits of information that can be embedded in the original data, which needs to be fulfilled, depending on the specific application. Robustness, imperceptibility, and capacity are requirements hindering each other; therefore, a trade-off driven by the application needs to be considered.

## 3 HDR image watermarking: state of the art

Despite digital watermarking of low dynamic range images having been deeply studied for more than two decades, watermarking of HDR media, both images and video, has not been extensively explored. In fact, a direct transposition of the techniques developed for LDR media is not straightforward since HDR media possess some peculiarities with respect to LDR ones which do not allow a direct transposition of the plethora of watermarking approaches already developed for LDR images and videos to the HDR case. In fact, the specific characteristics of the human visual system (HVS) related to the fruition of HDR media need to be exploited when designing HDR-tailored embedding techniques. Moreover, HDR-specific watermarking methods need to be robust against intentional attacks or signal processing manipulations like the use of tone-mapping operators (TMOs). The use of TMOs is necessary when HDR media need to be experienced using conventional displays in order to generate LDR data retaining as much information as possible from the original objects, while reducing the overall contrast. Therefore, it is highly desirable to design HDR watermarking schemes also robust against TMOs, thus allowing to either recover or detect the embedded mark not only from the marked HDR image but also from its tone-mapped version. In the following, an overview on the state of the art for HDR image watermarking is given. Specifically, in Section 3.1, the 1-bit embedding approaches are detailed, whereas the multi-bit approaches are summarized in Section 3.2.

### 3.1 HDR image watermarking: 1-bit embedding

Watermarking techniques aimed at embedding 1 bit of information imply the detection of the embedded watermark at the receiving side. In [7], two different watermarking methods, both of them splitting the cover HDR image into a host image where to embed the mark and a residual part, are investigated. The first approach employs the *Î¼*-law to characterize a generic TMO and applies it to the original HDR image to derive an LDR representation where the watermark can be embedded. The residual part is given by the ratio between the HDR and the LDR images. However, since the range of HDR images may be orders of magnitude greater than the one of LDR images, their ratio will be high in areas with high luminance, where the watermark will be therefore very strong. The second approach decomposes the HDR image into a detail and a coarse component by applying bilateral filtering. The watermark embedding is then performed in the detail component that preserves the imagesâ€™ edges. In fact, it is assumed that a generic TMO does not affect the image details and the color appearance, while addressing the problem of strong contrast reduction. Both methods proposed in [7] project the luminance of the detail component in the discrete wavelet domain. Then, the embedding is performed using spread-spectrum (SS) techniques. The experimental tests, conducted using five HDR images and four local TMOs, show that the visual quality of images marked with the *Î¼*-law-based approach, evaluated by means of the peak signal-to-noise ratio (PSNR) computed over tone-mapped images, is better than the one associated with the method relying on bilateral filtering. Specifically, the PSNR of the images marked with the first approach is within the 50â€“70-dB range, while the second one results in a PSNR of about 30â€“60 dB. However, bilateral filtering guarantees better performance in terms of robustness to the application of TMOs.

In [8], a general tone-mapping, represented by the logarithm function, is considered and applied to the luminance of the given HDR image, thus obtaining the LogLuv domain. The watermark embedding is performed by applying a quantization-index-modulation (QIM) approach [9] to the approximation subband of the discrete wavelet transform of the LogLuv component. Specifically, the image is divided into different blocks of random shapes, and the coefficients of each block are modified in order to make the block kurtosis equal to a non-uniformly quantized value determined by the bit to be embedded into the block. Mark imperceptibility is obtained by applying a local perceptual mask based on luminance, texture, and contrast that provides the maximum amount of distortion that each coefficient in the embedding domain can withstand without resulting in visible artifacts. Experimental tests conducted on 15 HDR images include an objective analysis on mark imperceptibility evaluated through the HDR-Visual Difference Predictor (HDR-VDP) metric [10] and on the robustness of watermark detection against seven different TMOs as well as to the addition of Gaussian noise in the HDR domain.

In [11], a non-linear hybrid embedding approach operating in the detail subbands of a one-level wavelet decomposition is used to watermark an HDR image. Specifically, the approach combines both additive and multiplicative watermark embedding and is based on a square-root embedding equation operating in the wavelet domain. The embedding approach is applied to 12 images, and its robustness is tested against the application of seven TMOs. The quality assessment is carried out using both the HDR-VDP metric and a pool of three observers on a native HDR display.

In [12], a bracketing approach mimicking the HDR image generation process, consisting of merging several single-exposure LDR images, is exploited for HDR image watermarking. In details, an HDR image is split into multiple LDR images, which are watermarked before being fused again into a single HDR image representation. The mark embedded in the HDR image thus generated results to be detectable in its LDR counterparts obtained by either applying a tone-mapping process or extracting and displaying only a specific range of interest of intensities. The HDR-VDP-2 metric [13] is employed to assess the performance. An equal error rate (EER) lower than 10^{âˆ’8} % is achieved when detecting a watermark from LDR images obtained with five different TMOS. EERs lower than 10^{âˆ’2} % are estimated when analyzing LDR images obtained by isolating, from the HDR data, a dynamic range different from the one considered during embedding.

A summary of the HDR image 1-bit watermarking approaches is given in in Table 1.

### 3.2 HDR image watermarking: multi-bit embedding

In [14], binary information is inserted into an HDR image encoded in RGBe format by substituting the least significant bits (LSBs) of each pixel with bits taken from the secret message. In more detail, the HDR image is divided into flat and boundary areas by comparing the exponents associated to neighboring pixels. The number of bits which can be embedded into each color channel is then adaptively determined on the basis of local contrast and depending on the considered area, embedding more bits in high contrast and dark regions than in smooth and bright ones. The method capacity, tested on seven HDR images, is around 10 bits per pixel (bpp). Its imperceptibility is evaluated by converting the HDR images into their LDR counterparts by means of a TMO and measuring the peak signal-to-noise ratio (PSNR) between the tone-mapped cover image and the tone-mapped watermarked image, obtaining values around 30 dB.

Images in uncompressed LogLuv TIFF format are considered in [15]. The LSB of each channelâ€™s mantissa is modified to insert a binary message, while the exponent is selected in order to minimize the difference between the final value and the original one. The visual quality of the resulting images is evaluated over seven HDR images by applying tone-mapping and computing the PSNR and the HDR-VDP metrics.

The RGBe format is considered in [16], where its property of expressing a given color according to different possible choices is employed to hide a message into an HDR image: the final color representation is selected among the equivalent ones on the basis of the bits of the secret message. Such an approach produces distortion-free watermarked images, being different with the original cover image due only to the conversion employed to determine the floating point value of the pixels. A capacity of about 0.12 bpp is estimated over five HDR images.

The blue component of a detail layer obtained exploiting bilateral filtering as in [7] is employed in [17] to embed into an HDR image binary messages with as many bits as the imageâ€™s pixels. The mark is inserted additively yet proportionally to the pixelsâ€™ luminance. The mark imperceptibility is measured only through the PSNR, evaluated over five HDR images, achieving values around 60 dB. No objective measurements of mark extraction capability are provided, and the robustness against TMO is not evaluated. It is worth noting that no intentional or unintentional attack is taken into account in any of the aforementioned approaches performing multi-bit message embedding.

This kind of analysis is performed for the first time in [18]. The preprocessing stage proposed in [7], consisting of splitting an HDR image into its LDR counterpart and a residual component, is employed also here. Four TMOs are taken into account for both embedding the watermark and attacking the marked HDR image when extracting the hidden data. Differently from [7], a multi-bit mark is blindly embedded into an image by associating each bit to a specific 8Ã—8 luminance block and by manipulating two of its middle-frequency discrete cosine transform (DCT) coefficients to make their difference dependent on the bit to be embedded. Tests performed on four HDR images provide a PSNR for tone-mapped watermarked images of about 40 dB, while a bit-error-rate (BER) of about 5 % is estimated between the mark embedded in the HDR image and the one extracted from the tone-mapped watermarked image. Cropping, Gaussian blur, and Gaussian noise addition are considered as attacks to the LDR marked images, resulting in BERs of about 12, 23, and 15 %, respectively.

In [19], a blind multi-bit watermarking method for HDR images is proposed. The employed embedding domain is obtained by applying the wavelet transform to the just-noticeable difference (JND)-scaled representation of the original HDR image. Such domain is exploited in order to process values directly associated with specific characteristics of the HVS. A visual mask based on bilateral filtering is used for the embedding region selection while the watermark intensity in each wavelet decomposition subband is modulated according to a contrast sensitivity function. An extensive set of experimental tests is conducted considering three HDR images and seven TMOs. The imperceptibility in the HDR domain is evaluated through the HDR-VDP-2 metric, while an EER lower than 10^{âˆ’3%} with a BER around 5 % is estimated over tone-mapped LDR images.

A summary of the HDR image multi-bit watermarking approaches is given in Table 2.

## 4 HDR image watermarking in the Radon DCT domain

The multi-bit embedding method designed by the authors in [6] is further explored in the following, and a more extensive set of experimental results is here presented.

Let us consider a message **m** of *M* bits to be embedded in an HDR image. With the goal to design a watermarking approach robust against non-malicious TMO application, we resort to perform mark embedding in the image edge region, since TMOs typically preserve the edges of the original image, whereas compressing its dynamic range and adapting it for rendering HDR images on devices with low contrast capabilities [20, 21]. In order to achieve the desired goal, the properties of the Radon DCT (RDCT) domain are here exploited. As detailed in [22], the RDCT is a two-stage transform that consists in performing, as a first step, the Radon transform which maps each line of the host image into a single point. The DCT follows, therefore, the energy of the Radon projection concentrated in the first coefficients of the resulting RDCT representation, which can be eventually used as the host signal where to embed the watermark. The proposed watermarking scheme is given in Fig. 1 and details on the watermark embedding and extraction are given in the following sections.

### 4.1 HDR embedding domain

Without any loss of generality, we assume that the original HDR image is represented in the *RGB* color space. The embedding is performed in the luminance component **Y**. Actually, most of TMOs perform alterations in the luminance component **Y** while compressing the original dynamic range, often resulting in unpredictable alterations of the chrominance contributions. Therefore, the chrominance components are not suitable to host the watermark. More specifically, in our approach, we consider the LogLuv domain [8], derived from the application of the logarithm to the luminance **Y**. The logarithmic operation simulates a specific property of the human visual system (HVS), that is, its higher sensitivity to contrast in shadow areas, whose dynamic is expanded by the logarithm, when compared to the contribution of highlights, which is on the contrary compressed. The resulting representation is then linearly normalized for generating an image **N** whose pixel values belong to the interval [ 0,1].

A discrete wavelet transform (DWT) decomposition, mimicking the processing performed by the HVS [23], of the image **N** is then performed, and one of the resulting subbands **N**
_{
Î³
}, with *Î³*âˆˆ{*LH,HL,HH*}, is selected.

The considered subband is then decomposed into *B* square blocks **f**
^{(b)} with size *P*Ã—*P*, *b*=1,â€¦,*B*, in order to perform a local analysis of the image properties. A message \(\mathbf {m}^{(b)} = [\!m^{(b)}_{1},\ldots,m^{(b)}_{C}]\) derived taking *C* bits from **m** is then embedded into each block **f**
^{(b)} according to the processing illustrated in Fig. 2 and described in the following. Having indicated with *S*
_{1}Ã—*S*
_{2} the size of the HDR image, the number of generated blocks is \(B = \lfloor \frac {S_{1}}{2 P} \rfloor \cdot \lfloor \frac {S_{2}}{2 P}\rfloor \), while the length of the embedded message **m** is therefore equal to *M*=*B*Â·*C* bits.

The RDCT transform is applied to each block **f**
^{(b)} extracted from **N**
_{
Î³
}, with *b*=1,â€¦,*B*. The embedding of *C* bits is then applied in the transformed domain as in [22]. Specifically, the employed implementation is based on the invertible and non-redundant finite Radon transform (FRAT) presented in [24]. Given a real-valued function **f**
^{(b)} defined over a finite square grid \({Z_{P}^{2}}\), being *Z*
_{
P
}={0,1,â‹¯,*P*âˆ’1}, its FRAT **r**
^{(b)} is defined as

where *L*
_{
k,l
} defines the set of points that forms a line on \({Z_{P}^{2}}\):

being *k*âˆˆ*Z*
_{
P+1} the line direction and *l*âˆˆ*Z*
_{
P
} its intercept.

The Radon projections, obtained as in (1), are further processed in order to concentrate their energies in few coefficients. This goal is achieved by applying the DCT to the Radon projections, thus obtaining the RDCT sequences as

with *q*âˆˆ*Z*
_{
P
}, \(\omega [\!0] = \sqrt {1/P}\), and \(\omega [\!l] = \sqrt {2/P}\), *l*â‰ 0. The energy concentration provided by the RDCT is similar to that performed by the ridgelet transform [24], yet with a better behavior and performance for watermarking purposes provided by the RDCT, as shown in [22].

### 4.2 Host coefficients selection and QIM embedding

The host coefficients where to embed the mark are selected as those related to the presence of edges. This task is accomplished by considering the RDCT projections of a given block **f**
^{(b)} and by sorting the *P*+1 directions available in **d**
^{(b)} according to their energies in decreasing order and finally selecting *H* directions for mark embedding. Specifically, the directions from the *h*
_{max}-th to the *h*
_{min}-th most energetic ones, with *H*=*h*
_{min}âˆ’*h*
_{max}+1, are selected to embed the *C* bits of **m**
^{(b)} in each of them.

Having indicated with **d**
^{(b)}[*k*
_{
h
},*q*] the RDCT projection with the *h*-th most energetic contribution, with *h*âˆˆ{*h*
_{max},â€¦,*h*
_{min}}, *C* coefficients are taken from it and modified through QIM [9] to embed the desired message. It is worth specifying that, before doing this, the values in the considered RDCT projection are linearly normalized between 0 and 1, thus producing the projections \(\mathbf {d}_{N}^{(b)}[\!k_{h},q]\). The coefficients having extreme values (0 and 1 after normalization) are not modified to not alter the range of the original values. Also, the RDCT coefficient \(\mathbf {d}_{N}^{(b)}[\!k_{h},0]\), representing the DC component of the Radon projection, cannot be modified being connected with the mean value of all the projections computed from **f**
^{(b)}, as pointed in [22]. Therefore, the *C* coefficients to be marked are selected as the first ones of the available RDCT sequence, with the exception of the aforementioned elements, namely the DC coefficient and the extreme values.

The *c*-th bit of **m**
^{(b)}, with *c*âˆˆ{1,â€¦,*C*}, is therefore considered to alter the original coefficient \(\mathbf {d}_{N}^{(b)}[\!k_{h},q_{c}]\) according to a QIM approach (see Fig. 3). Specifically, keeping in mind that the considered coefficients lie in the interval [0,1], two code books \(\mathcal {U}_{0}\) and \(\mathcal {U}_{1}\) containing quantized values associated, respectively, to \(m^{(b)}_{c} = 0\) and \(m^{(b)}_{c} = 1\) can be defined as

being *Î”* the natural integer determining the quantization step \(\frac {1}{2^{\Delta }}\) between admissible quantized values.

Watermark embedding is achieved by applying to \(\mathbf {d}_{N}^{(b)}[k_{h},q_{c}]\) either the quantizer associated to \(\mathcal {U}_{0}\) or the one associated to \(\mathcal {U}_{1}\):

where *u*
_{0,z
} and *u*
_{1,z
} are elements of \(\mathcal {U}_{0}\) and \(\mathcal {U}_{1}\), respectively. The marked coefficient \(\tilde {\mathbf {d}}_{N}^{(b)}[k_{h},q_{c}]\) can be expressed as

The effects on the achievable performance, in terms of mark imperceptibility and robustness, of the employed parameters, namely the choice of the wavelet subband *Î³*, the block size *P*, the embedding directions and coefficients, and the quantization parameter *Î”*, are discussed in Section 5. As for the capacity achievable with the proposed approach, it is easy to express it in a closed form as \(\frac {C}{4 \cdot P^{2}}\) bpp. Practical values of the lengths of messages which can be embedded into HDR images are given in Section 5.

### 4.3 HDR image reconstruction

As described in the previous section, the block \(\tilde {\mathbf {d}}_{N}^{(b)}\) is obtained from \(\mathbf {d}_{N}^{(b)}\) by marking *C* coefficients of each direction *k*
_{
h
}, with *h*âˆˆ{*h*
_{max},â€¦,*h*
_{min}}. The RDCT representation \(\tilde {\mathbf {d}}^{(b)}\) is derived by reversing the normalization process performed during the embedding. The watermarked block \(\tilde {\mathbf {f}}^{(b)}\) is then determined through an inverse RDCT. The marked wavelet subband \(\tilde {\mathbf {N}}_{\gamma }\) is reconstructed by recombining all the *B*-marked blocks. The marked normalized luminance \(\tilde {\mathbf {N}}\) is then generated by combining \(\tilde {\mathbf {N}}_{\gamma }\) with the other unaltered subbands \(\tilde {\mathbf {N}}_{\eta }\), *Î·*â‰ *Î³*, and performing the inverse wavelet transform. The normalization process done during the embedding is reversed by applying an exponential operator thus obtaining the marked luminance \(\tilde {\mathbf {Y}}\) which, as a result, is characterized by the same dynamic range of the original luminance **Y**. The final watermarked image is generated by defining its trichromatic components as \(\tilde {\mathbf {R}} = \frac {\mathbf {R}}{\mathbf {Y}}\cdot \tilde {\mathbf {Y}}\), \(\tilde {\mathbf {G}} = \frac {\mathbf {G}}{\mathbf {Y}} \cdot \tilde {\mathbf {Y}}\) and \(\tilde {\mathbf {B}} = \frac {\mathbf {B}}{\mathbf {Y}} \cdot \tilde {\mathbf {Y}}\). Therefore, the original chrominance contributions are kept unaltered, while the luminance of the resulting image allows to blindly recover the embedded information.

### 4.4 Mark extraction

In the watermark extraction stage, the marked HDR image undergoes the same operations described in Section 4.1 thus obtaining the RDCT projections \(\bar {\mathbf {d}}^{(b)}[\!k_{h},q]\) with *h*âˆˆ{*h*
_{max},â€¦,*h*
_{min}}. Each projection is first normalized between 0 and 1, thus obtaining \(\bar {\mathbf {d}}_{N}^{(b)}\), and then, the embedded bit estimation \(\hat {m}^{(b)}_{h,c}\), *c*=1,â€¦,*C* is performed using a minimum distance decoder:

The final estimations \(\hat {m}^{(b)}_{c}\), *c*=1,â€¦,*C*, of the *C* bits embedded into the block \(\bar {\mathbf {d}}^{(b)}\) are made according to a majority-voting decision evaluated over the *H* estimates \(\hat {m}^{(b)}_{h,c}\), *h*âˆˆ{*h*
_{max},â€¦,*h*
_{min}}, available for each embedded bit.

It is worth specifying that the proposed approach takes into account more than a single direction for embedding *C* bits in each block to properly manage errors during the extraction process. Specifically, a relevant source of errors comes from the possibility of selecting for a block, during the mark extraction process, projections which differ from those employed during the embedding. In fact, if the energies of the RDCT projections of a given block are modified by some processing applied to the marked HDR image, the order with which the projections are selected to extract the mark may be altered, making it hard to recover the bits inserted into the considered block. The employed majority-voting decision strategy allows mitigating the effects of such events.

The considered approach allows also retrieving the embedded information from a tone-mapped LDR version of the watermarked HDR image. However, in this scenario, the mark is extracted directly from the luminance of the considered LDR image and not from its logarithmic counterpart. As in [8], it is in fact assumed that the application of a TMO produces a perceptual processing similar to the one performed by the logarithm operator.

## 5 Experimental results

An extensive set of experimental tests has been carried out to evaluate the performance of the proposed blind watermarking approach for HDR images. Specifically, to this aim, we have exploited 15 HDR images collected from http://www.mpi-inf.mpg.de/resources/hdr/gallery.html and http://www.anyhere.com/gward/hdrenc/pages/originals.html. The main characteristics of the employed images are listed in Table 3, while Fig. 4 shows all of them through their LDR representations, obtained with the ICAM06 TMO [25]. As can be seen, in the performed tests, we have considered images with different dimensions, dynamic ranges, and amount of edges and textured areas, in order to investigate the performance of the proposed method under a significant variability of possible practical conditions. Moreover, all the employed images have been selected to represent the depicted scenarios through real luminance values expressed in cd/*m*
^{2}, being thus possible to exploit the HDR-VDP-2 metric [13] to objectively evaluate the imperceptibility of the embedded watermarks. In more details, the HDR-VDP-2 metric provides, for each pixel of a modified image, the probability of being detected as different from the original representation, that is, the percentage of people recognizing the pixel being modified. The latest HDR-VDP-2 version currently available (ver. 2.2.1) is employed in the performed tests.

The embedding capacities practically achievable for the considered images are shown in Table 4, for different values of *P* and using *C*=3. As can be seen, the size of the embedded messages can grow very large, depending on the dimensions of the selected HDR image.

Table 4 also reports the processing time required for embedding messages into an HDR image according to the proposed method, when using Matlab [26] on a computer equipped with an Intel(R) Core(TM) i7-4500U at 1.8 GHz and 8.0 GB RAM. Given an HDR image, the required processing time is mainly dependent on the adopted block size *P*, and only the dependency on this parameter is therefore shown in Table 4, which provides values obtained with *Î”*=2, [ *h*
_{max},*h*
_{min}]=[1,5], and *C*=3. As can be seen, large values of *P* are preferable for speeding up the marking process.

An analysis of the imperceptibility performance guaranteed by the proposed approach is then provided in Table 5, where the dependency on the employed parameters is investigated. Specifically, the table reports the maximum probability of detecting differences between the original and the marked data in at least the 5 % of the image pixels, for different choices of *P*, *Î”*, [ *h*
_{max},*h*
_{min}] and *C*. It is worth specifying that the reported results are always referred to the mark embedding in the *Î³*=*H*
*H* subband, since it provides far better imperceptibility performance with respect to the other first-level DWT subbands *LH* and *HL*. Actually, the evaluated probability of detecting a modification in at least 5 % of the image is 1.96 % when *Î³*=*H*
*H*, averaged over all the considered selections for the directions to be marked and the number of modified coefficients, with *P*=17 and *Î”*=2. On the other hand, the same probability is 41.35 % when using the horizontal detail subband *Î³*=*H*
*L* and reaches 53.13 % for the vertical detail subband *Î³*=*L*
*H*.

As can be seen from the results reported in Table 5, although decreasing the block dimension *P* would imply the possibility of embedding more bits in a given HDR image as shown in Table 4, it would also result in an increased probability of detecting a modification in the marked HDR image. The obtained results also show that the embedded mark is more imperceptible as the parameter *Î”* is set to higher values, since a smaller quantization step \(\frac {1}{2^{\Delta }}\) is thus obtained. Moreover, selecting the *H*=3 first most energetic directions to embed the mark in each image block guarantees a lower perceptual impact than using *H*=5 directions. Within this regard, it can be also noticed that mark imperceptibility can be improved by discarding the most energetic projection for the embedding, as it is shown by the results achieved with [ *h*
_{max},*h*
_{min}]=[ 2,4] and [*h*
_{max},*h*
_{min}]=[ 2,6]. Eventually, the increase of the number of the marked coefficients *C* increases the number of embedded bits at the cost of worsening the imperceptibility performance.

A visual example on the imperceptibility of the embedded mark is given in Fig. 5, where the original image 1 is shown together with its processed version with *Î³*=*H*
*H*, *P*=17, [ *h*
_{max},*h*
_{min}]=[ 1,5], *C*=3 and *Î”*=2. The reported LDR representations are obtained by means of the ICAM06 TMO [25]. From Table 5, it can be seen that such choice of system parameters allows to guarantee, on average, a probability of detecting a modification in at least 5 % of the image which is equal to 6.4 %. In order to further demonstrate the effectiveness of the proposed approach, the achieved performance is compared with the one provided by the method in [18], the only one so far proposed that allows to embed large messages (>1000 bits) in an HDR image, while being able to recover them from tone-mapped marked images, as reported in Table 2. It has been noticed that, when applying the method in [18] to the 15 images considered for our experiments, the average probability of detecting a modification in at least 5 % of the marked images, measured with the HDR-VDP-2 metric, is equal to 27.6 %, being therefore much larger than the one obtained by the approach we propose. It is worth specifying that the parameters of the work in [18] have been selected in order to guarantee as much imperceptibility as possible, while still achieving admissible performance regarding data extraction from marked HDR images. The method in [18] in fact relies on the modification of a DCT coefficient in each 8Ã—8 block of an LDR version of the considered HDR content. Nonetheless, large alterations are needed to achieve low BER values. The Durand TMO [20] is employed to generate the LDR images where the mark is embedded, as described in [18].

The parameter configuration with *Î³*=*H*
*H*, *P*=17, [ *h*
_{max},*h*
_{min}]=[ 1,5], *C*=3, and *Î”*=2 is taken into account to also evaluate the robustness of the proposed approach. Within this regard, Table 6 reports the BERs obtained when retrieving the embedded marks from the marked HDR images, as well as from their LDR counterparts obtained with the six TMOs listed in the table. From the reported results, it is evident that some errors may be encountered even when analyzing the marked HDR images, mainly due to the modification of the directions energies when performing the embedding and to the conversions performed when saving the marked images into an HDR format. Moreover, it can be seen that the application of distinct TMOs may represent a very different attack for the extraction of the mark from LDR representations. For instance, with the selected configuration, the best performance is achieved when considering the Reinhard TMO [27], while significantly worse results are obtained with the tonemap operator provided in Matlab [26]. It can be argued that the Reinhard TMO provides the best performance since it is based on bilateral filtering, therefore trying to accurately maintain the edges of an HDR image when converting it into its LDR version. Being the proposed approach based on data embedding close to the edges, a TMO preserving these components is also able to preserve the information there hidden.

The comparison between the robustness performance of the proposed approach, when still maintaining the aforementioned system parameters, and the method in [18], is given in Table 7. It can be seen that the method in [18] performs quite similarly for all the considered TMOs, yet it can never provide results as good as those achieved with our approach. Mark extraction is hard from HDR images, too, when an admissible imperceptibility has to be guaranteed with the method in [18].

A more detailed analysis on the capability of extracting a mark from tone-mapped versions of the marked HDR images is obtained by evaluating the BER achievable for different system configurations. As for the imperceptibility analysis, Table 8 reports the performance obtained for different choices of *P*, *Î”*, [ *h*
_{max},*h*
_{min}], and *C*, while embedding the marks in the *Î³*=*H*
*H* first-level decomposition subband.

Imperceptibility and robustness of the embedded marks are often conflicting requirements. This is experimentally confirmed by observing that the embedded marks can be extracted with less errors from LDR images obtained when using a lower value of *Î”*, since the resulting quantization step is much larger, even if the imperceptibility is negatively affected. It can be also seen that selecting a large number of directions for embedding purposes improves the mark extraction capabilities, although slightly affecting the imperceptibility of the performed modifications. Moreover, excluding the most energetic direction during the embedding worsens the achievable BERs, even if it is beneficial from the imperceptibility point of view, for both *H*=3 and *H*=5. As for the number of coefficients *C* marked for each direction, no meaningful difference in terms of BER can be noticed, thus suggesting to use *C*=3, even if at the cost of a higher visibility of the modifications. It has also to be noticed that, although increasing the block dimension *P* significantly improves mark imperceptibility, it does not affect negatively the mark extraction capability, making thus preferable the selection of large block values such as *P*=17. With such a selection, and exploiting a system configuration with *Î”*=2, [ *h*
_{max},*h*
_{min}]=[ 1,5], and *C*=3, it is possible to guarantee a probability of detecting a modification in at least the 5 % of the image of about 6 %, while simultaneously achieving a BER for the mark extracted from LDR images at about 19 %, with marks in the order of at least a thousand of bits for the most of considerable images, as shown in Table 4.

It is also worth mentioning that even the selection of the DWT subband to be marked affects the robustness of the marking procedure: considering *P*=17 and *Î”*=2, the BER obtained for *Î³*=*H*
*H* is equal to 25.66 %, averaged over all the considered possibilities for marked directions and number of modified coefficients, while a better behavior is obtained when using the horizontal details (*Î³*=*H*
*L*) subband achieving a BER =15.31 *%* and the vertical detail (*Î³*=*L*
*H*) subband achieving a BER =14.56 *%*. The trade-off between imperceptibility and robustness is confirmed by this analysis too.

Eventually, besides analyzing the robustness of the proposed approach against non-malicious attacks such as those performed by means of TMOs, we have also evaluated the behavior of our watermarking schemes against malicious signal processing attacks carried out on the marked HDR images, still considering a system configuration with *P*=17, *Î”*=2, [*h*
_{max},*h*
_{min}]=[ 1,5], and *C*=3. Specifically, Table 9 presents the BER performance, averaged over all the considered 15 images, achieved when extracting the embedded messages from HDR images attacked with additive Gaussian noise and with Gaussian blurring. In more detail, Gaussian noise with a standard deviation equal to 3 has been added to the employed images, while the employed Gaussian blurring filter has been defined with a [3, 3] window and a standard deviation set to 0.3. We have also investigated the possibility of extracting the embedded information from tone-mapped versions of the attacked HDR images. As the reported results testify, the proposed approach is able to provide proper resilience even against malicious signal processing attacks. Our method performs significantly better than the one in [18] when considering Gaussian filtering as an attack, while similar behaviors have been observed when attacking the marked HDR images with additive Gaussian noise.

## 6 Conclusions

HDR images represent valuable content, whose intellectual property needs to be protected by means of proper digital techniques. To this aim, a blind multi-bit watermarking method for HDR images has been presented in this paper. The proposed approach hides information in areas closely associated to image contours, thanks to the properties of the considered RDCT transform. The selected embedding domain guarantees proper imperceptibility of the inserted marks, while providing the means for blindly extracting the embedded information without the need of the original image. An extensive set of experimental tests, conducted on 15 different HDR images, has been conducted to estimate the performance of the proposed method. The HDR-VDP-2 metric is employed to evaluate the perceptibility of the performed modifications, while six different TMOs have been employed to evaluate the possibility of retrieving the embedded data from LDR images generated from the marked HDR ones. The effects of signal processing attacks such as Gaussian additive noise and filtering have been also evaluated. The obtained results testify the effectiveness of the proposed approach, also showing the trade-off relationships between imperceptibility, robustness, and capacity when varying the parameters determining the employed system configurations.

## References

F Banterle, A Artusi, K Debattista, A Chalmers,

*Advanced High Dynamic Range Imaging: Theory and Practice*(AK Peters (CRC Press), Natick, MA, USA, 2011).JJ McCann, A Rizzi,

*The Art and Science of HDR Imaging*(Wiley, USA, 2011).F Barni, F Bartolini,

*Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications*(CRC Press, USA, 2004).IJ Cox, M Miller, JA Bloom, J Fridrich, T Kalker,

*Digital Watermarking and Steganography*(Morgan Kaufmann, USA, 2008).J Fridrich,

*Steganography in Digital Media: Principles, Algorithms, and Applications*(Cambridge University Press, USA, 2009).E Maiorana, V Solachidis, P Campisi, in

*IEEE International Symposium on Image and Signal Processing and Analysis*. Robust multi-bit watermarking for HDR images in the Radon-DCT domain (IEEETrieste, Italy, 2013).X Xue, T Jinno, J Xin, M Okuda, Watermarking for HDR image robust to tone mapping. IEICE Trans. Fundam. Electron. Commun. Comput. Sci.

**94**(11), 2334â€“2341 (2011).F Guerrini, M Okuda, N Adami, R Leonardi, High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans. Inf. Forensics Sec.

**6**(2), 283â€“295 (2011).B Chen, GW Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory.

**47**(4), 1423â€“1443 (2001).R Mantiuk, K Myszkowski, H-P Seidel, in

*IEEE Internation Conference on Systems, Man and Cybernetics*. Visible difference predictor for high dynamic range images (IEEEThe Hague, Netherlands, 2004).F Autrusseau, D Goudia, in

*20th IEEE International Conference on Image Processing (ICIP)*. Non linear hybrid watermarking for high dynamic range images (IEEEMelbourne, Australia, 2013).V Solachidis, E Maiorana, P Campisi, F Banterle, in

*IEEE International Conference on Digital Signal Processing (DSP)*. HDR image watermarking based on bracketing decomposition (IEEESantorini, Greece, 2013).R Mantiuk, KJ Kim, AG Rempel, W Heidrich, HDR-VDP-2: a calibrated visual metric for visibility and quality predictions in all luminance conditions. ACM Trans. Graph.

**30**(4), 1â€“14 (2011).Y-M Cheng, C-M Wang, A novel approach to steganography in high-dynamic-range images. IEEE Multimedia.

**16**(3), 70â€“80 (2009).MT Li, NC Huang, CM Wang, A data hiding scheme for high dynamic range images. International Journal of Innovative Computing Information and Control (IJICIC).

**7**(5A), 2021â€“2035 (2011).C-M Yu, K-C Wu, C-M Wang, A distortion-free data hiding scheme for high dynamic range images. Displays.

**32**(5), 225â€“236 (2011).C Rattanacharuchinda, T Amornraksa, in

*International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)*. Image watermarking for high dynamic range images (IEEEHua Hin, Thailand, 2012).J-L Wu, in

*Watermarking - Volume 2*. Robust watermarking framework for high dynamic range images against tone-mapping attacks (InTechUSA, 2012), pp. 229â€“242.V Solachidis, E Maiorana, P Campisi, in

*Proc. SPIE 8655, Image Processing: Algorithms and Systems XI, 865505*. HDR image multi-bit watermarking using bilateral-filtering-based masking (SPIESan Francisco, USA, 2013).F Durand, J Dorsey, Fast bilateral filtering for the display of high-dynamic-range images. ACM Trans. Graph.

**21**(3), 257â€“266 (2002).Z Farbman, R Fattal, D Lischinski, R Szeliski, Edge-preserving decompositions for multi-scale tone and detail manipulation. ACM Trans. Graph.

**27**(3), 1â€“10 (2008).E Maiorana, P Campisi, A Neri, in

*IEEE Biometrics Symposium*. Biometric signature authentication using Radon transform-based watermarking techniques (IEEEBaltimora, USA, 2007).S Mallat,

*A Wavelet Tour of Signal Processing: The Sparse Way*(Accademic press, Waltham, MA, USA, 2008).MN Do, M Vetterli, The finite ridgelet transform for image representation. IEEE Trans. Image Process.

**12**(1), 16â€“28 (2003).J Kuang, GM Johnson, MD Fairchild, iCAM06: a refined image appearance model for HDR image rendering. J. Vis. Commun. Image Represent.

**18**(5), 406â€“414 (2007).F Drago, K Myszkowski, T Annen, N Chiba, Adaptive logarithmic mapping for displaying high contrast scenes. EUROGRAPHICS.

**22**(3), 419â€“426 (2003).E Reinhard, M Stark, P Shirley, J Ferwerda, Photographic tone reproduction for digital images. ACM Trans. Graph.

**21**(3), 267â€“276 (2002).F Drago, K Myszkowski, T Annen, N Chiba, Adaptive logarithmic mapping for displaying high contrast scenes.

**22**(3), 419â€“426 (2003).J Tumblin, H Rushmeier, Tone reproduction for realistic images. IEEE Comput. Graph. Appl.

**13**(6), 42â€“48 (1993).

## Author information

### Authors and Affiliations

### Corresponding author

## Additional information

### Competing interests

The authors declare that they have no competing interests.

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## About this article

### Cite this article

Maiorana, E., Campisi, P. High-capacity watermarking of high dynamic range images.
*J Image Video Proc.* **2016**, 3 (2016). https://doi.org/10.1186/s13640-015-0100-7

Received:

Accepted:

Published:

DOI: https://doi.org/10.1186/s13640-015-0100-7

### Keywords

- High dynamic range
- Data hiding
- Watermarking