4. HVS & Watermarking

Hiding information effectively requires utilizing specific strategies to ensure that unauthorized individuals cannot detect the hidden object. There are four main techniques:

  1. Keep it secret: The hidden object is placed in a location unknown to unauthorized individuals. If the location is unknown, the object is unlikely to be discovered.
  2. Make it small: The hidden object is made so small that it becomes imperceptible to the human eye. Human perception is limited by object size.
  3. Make it similar: The hidden object is designed to resemble its surroundings so closely that it becomes indistinguishable.
  4. Make it spread: The hidden object is divided into small pieces that are spread around, making it impossible to perceive the object as a whole.

Human Visual System (HVS)

The Human Visual System (HVS) plays a crucial role in how people perceive images. Several key principles govern how humans detect disturbances in visual data:

Just Noticeable Difference (JND)

Let's see an example, watch this image:

Pasted image 20250205092603.png|700

A small square with uniform luminance L+Δ is superimposed on a uniform background of luminance L. The value of Δ is gradually increased until the human observer perceives a difference between the square and the background. The minimum amount of intensity change required to notice a difference is termed the Just Noticeable Difference (JND). The JND increases for very low and very high luminance values.

Pasted image 20250205092727.png|600

Weber’s Law

Weber’s law states that the ratio of the just noticeable difference to the background intensity is a constant. This can be observed in daily life: in a noisy environment, one must shout to be heard, whereas in a quiet room, a whisper suffices. Mathematically, this means that the threshold for detecting differences in intensity is proportional to the background luminance.

For a wide range of luminance values, the Weber fraction remains constant at approximately 0.02.

More complex models are necessary to accurately represent human vision in the presence of textured patterns.

Masking in the Human Visual System

The human eye is most sensitive to changes in brightness (luminance) at medium levels. This means that if an image is neither too dark nor too bright, small variations in brightness are more noticeable. However, at very low or very high luminance levels, the ability to perceive changes decreases.
Instead, when multiple visual stimuli are present, a phenomenon called masking occurs. This means that a new stimulus (such as a watermark) can become less visible if other visual patterns are already in the image.
If a new stimulus appears on top of a background that contains a sinusoidal pattern (a repeating wave-like signal), the new stimulus might be harder to distinguish. The background acts as a mask, reducing the visibility of the new element.
The masking effect is strongest when the stimulus and the masking signal share the same frequency, phase, and orientation. In simpler terms, if both patterns oscillate at the same speed, in the same direction, and in sync, the new stimulus blends into the background, making it nearly invisible.

In digital watermarking, this masking effect is crucial. By embedding the watermark in areas where natural masking occurs, we can make it less detectable to human observers while still ensuring that it remains retrievable when needed.

Frequency Masking in Watermarking

Frequency masking is an essential concept in watermarking. The formula for watermark embedding in the frequency domain is:

|fiw|=|fi|+αwi|fi|

where:

Here some problems:

Improved Watermarking Techniques

Barni et al. (2001) proposed an improved wavelet-based watermarking approach using pixel-wise masking:

The embedding process follows:

I0θ(i,j)=I0θ(i,j)+αwθ(i,j)xθ(i,j)

where:

Selection of Subbands

Watermarking is typically embedded into the three largest detail subbands, balancing robustness and imperceptibility (based on experimental tests):

Spatial Masking

Spatial masking exploits HVS characteristics to hide watermarks in high-activity regions.

Watermark insertion follows:

graph LR
    A[Input image] --> B[Watermark insertion]
    w --> B
    B --> C[Spatial mask construction]
    B --> D
    C --> D[Spacial masking]
    D --> E[Marked image]

where:

These are the goals of spatial masking:

Heuristic Masking

Heuristic methods further optimize watermark placement:

There are some problems though:

Curiosity: Watermarking vs. Compression

The duality between the problem of data hiding and that of compression consists in the fact that, while in compression technology the aim is to remove from the multimedia document all those data which are perceptually less important, in data hiding technology the goal is, on the contrary, to add to the multimedia document some data in such a way that they result to be perceptually unimportant.

We can say they are inverse problems, but:

Despite their opposition, watermarking can be designed to be robust against compression by carefully embedding data in regions less affected by common compression techniques.