SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
International
OPEN

Journal

ACCESS

Of Modern Engineering Research (IJMER)

A Robust Watermarking Technique Based On Dwt on Digital
Images
B. Mohan Swaroop, Assistant Professor,
Potti Sriramulu Chalavadi Mallikharjunarao College of Engg & Tech

ABSTRACT: In this paper a robust watermark scheme for copyright protection is proposed. By
modifying the original image in transform domain and embedding a watermark in the difference values
between the original image and its reference image, the proposed scheme overcomes the weak
robustness problem of embedding a watermark in the spatial domain. Besides the watermark extraction
does not require the original image so it is more practical in real application. The experimental results
show that the proposed scheme provides not only good image quality, but also robust against various
attacks such as compression and noise addition.
Many image transforms have been considered and the most prominent among them us the
discrete cosine transform (DCT) which has also been favored in the early image and coding standards.
Hence, there is a large number of watermarking algorithms that use either a block based or global
DCT. But the disadvantage in DCT is that it has only frequency resolution and no time resolution.
A new multi resolution watermarking method for digital images has been introduced. Wavelets
are mathematical functions that cut the data into different frequency components and then study each
component with a resolution matched to its scale. The method is based on the discrete wavelet
transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle
frequency bands of the DWT of an image. It is more robust to proposed methods to some common
image distortions, such as image compression, image rescaling/stretching.

Keywords: Digital Watermarking, Discrete wavelet transform, Information security, Encryption,
Stegonagraphy.

I. INTRODUCTION
A great deal of information is now being created, stored, and distributed in digital form. Newspapers,
and magazines, for example, have gone online to provide real-time coverage of stories with high-quality audio,
still images, and even video sequences. The growth in use of public networks such as the Internet has further
fueled the online presence of publishers by providing a quick and inexpensive way to distribute their work. The
explosive growth of digital media is not limited to news organizations, however. Commercial music may be
purchased and downloaded off of the Internet, stock photography vendors digitize and sell photographs in
electronic form, and Digital Versatile Disc (DVD) systems provide movies with clear images and CD quality
sound.
Unfortunately, media stored in digital form are vulnerable in a number of ways. First of all, digital
media may be simply copied and redistributed, either legally or illegally, at low cost and with no loss of
information. In addition, today's fast computers allow digital media to be easily manipulated, so it is possible to
incorporate portions of a digital signal into one's own work without regard for copyright restrictions placed upon
the work. Encryption is an obvious way to make the distribution of digital media more secure, but often there is
no way to protect information once it has been decrypted into its original form. The ability for pirates to easily
copy works is one of the last hurdles that keep publishers from completely adopting online distribution systems.
Digital watermarking is seen as a partial solution to the problem of securing copyright ownership.
Essentially, watermarking is defined as the process of embedding sideband data directly into the samples of a
digital audio, image, or video signal. Sideband data is typically “extra” information that must be transmitted
along with a digital signal, such as block headers or time synchronization markers. It is important to realize that
a watermark is not transmitted in addition to a digital signal, but rather as an integral part of the signal samples.
The value of watermarking comes from the fact that regular sideband data may be lost or modified when the
digital signal is converted between formats, but the samples of the digital signal are (typically) unchanged.
| IJMER | ISSN: 2249–6645 |

www.ijmer.com

| Vol. 4 | Iss. 1 | Jan. 2014 |110|
A Robust Watermarking Technique Based On Dwt on Digital Images
The earliest forms of information hiding can actually be considered to be highly crude forms of privatekey cryptography; the “key” in this case being the knowledge of the method being employed (security through
obscurity). Steganography books are filled with examples of such methods used throughout history. Greek
messengers had messages tattooed into their shaved head, concealing the message when their hair finally grew
back. Wax tables were scraped down to bare wood were a message was scratched. Once the tablets were rewaxed, the hidden message was secure. Over time these primitive cryptographic techniques improved,
increasing speed, capacity and security of the transmitted message.

II. WATERMARKING
Although steganography and watermarking both describe techniques used for covert communication,
steganography typically relates only to covert point to point communication between two parties.
Steganographic methods are not robust against attacks or modification of data that might occur during
transmission, storage or format conversion.
Watermarking, as opposed to steganography, has an additional requirement of robustness against
possible attacks. An ideal steganographic system would embed a large amount of information perfectly securely,
with no visible degradation to the cover object. An ideal watermarking system, however, would embed an
amount of information that could not be removed or altered without making the cover object entirely unusable.
As a side effect of these different requirements, a watermarking system will often trade capacity and
perhaps even some security for additional robustness. The working principle of the watermarking techniques is
similar to the steganography methods. A watermarking system is made up of a watermark embedding system
and a watermark recovery system. The system also has a key which could be either a public or a secret key. The
key is used to enforce security, which is prevention of unauthorized parties from manipulating or recovering the
watermark. The embedding and recovery processes of watermarking are shown in below figures.

Watermark W

Cover object C

Digital watermark

Watermarked data W

Secret / Public Key K
Fig-1.1 Digital watermarking – Embedding/Encryption
For the embedding process the inputs are the watermark, cover object and the secret or the public key. The
watermark used can be text, numbers or an image. The resulting final data received is the watermarked data W.

Cover object C

Watermarked data W

Watermark detection

Watermarked data W

Secret / Public Key K
Fig-1.2 Digital watermarking – Decoding
The inputs during the decoding process are the watermark or the original data, the watermarked data and the
secret or the public key. The output is the recovered watermark W.

III. THE PROPOSED SCHEME
The proposed scheme utilizes the concept of Joo et al.’s scheme to embed a watermark into an image.
Motivation for the proposed scheme
In 2002, Joo et al. proposed a robust watermark scheme by embedding a watermark into wavelet low
frequency sub-band. It is briefly introduced as follows. First, an image with size of 512 by 512 pixels is
transformed into wavelet coefficients by three-level wavelet transform and extract the sub-band LL 3 . The
| IJMER | ISSN: 2249–6645 |

www.ijmer.com

| Vol. 4 | Iss. 1 | Jan. 2014 |111|
A Robust Watermarking Technique Based On Dwt on Digital Images
extracted sub-band LL 3 is further decomposed into four sub-bands and then three high frequency sub-bands

LH 4 , HL4 , HH 4  are set to zero.

Fig. 1.3 Three-level wavelet decomposition of an image
After performing inverse wavelet transform, its reference sub-band

'
LL3 is obtained. The information

idx of embedding location in the watermark embedding process is obtained by sorting LL3

 LL3 . Finally, the
'

  

watermark information is embedded into the sub band LL 3 by LL3  LL3  k  w idx i , where k is a
factor for controlling embedding intensity and w is a pseudo-random binary sequence with the length of 1000
bits generated by using a seed, w belongs to{1,1}. Besides, due to the fact that change to LL 3 values also cause
'

'

some change to its reference LL3 values, hence, the embedding process is repeated. As the embedding process
is repeated, the image quality is decreased but its reliability is increased.
In watermarking extraction process, the original image is required for obtaining the watermark
embedding location. According to the embedding location, the watermark can be extracted by comparing the
'

two sub-bands LL 3 and LL3 . Finally, the extracted watermark is compared with the original watermark by
similarity measure formula. We know that, for an image, most of energy is concentrated on low-frequency and
human eyes are sensitive to the change of low-frequency. Although the above scheme provides the
characteristics of robustness and imperceptibility, but the embedding process is quite time-consuming. Besides,
the original image is required in the watermark extraction process, which is impractical in real application.
The watermark embedding
The original image X is a gray-level image with M by N pixels. The watermark W is a pseudo random
bit-sequence generated by using a seed. They are defined as follows:

X  xi, j  0  i  M 1,0  j  N 1,0  xi, j   255  and

W  wk 1  k  n, wk  ,1  
1

First, the original image is modified in transform domain. Then, a watermark is embedded into the original
image according to the difference values between the original image and its reference image.
Input:

An original image X and watermark W .

Output: A watermarked image X w and a sequence idx of embedding location.
1.
2.
3.
4.

Step 1: Transform the original image into wavelet coefficients by one-level wavelet transform.
Step 2: Set three high-frequency sub-bands LH 1 , HL1 and HH 1 to zero.
Step 3: Perform inverse wavelet transform and obtain its reference image.
'
Step 4: Compute the differences between the original image X and its reference image X . Then obtain

location

idxi, j

 such that s  xi, j   x ' i, j 

 t , where s and t  Z  .

5. Step 5: According to the result of Step 4, randomly select some locations to embedding. The watermark is
embedded as follows.

| IJMER | ISSN: 2249–6645 |

www.ijmer.com

| Vol. 4 | Iss. 1 | Jan. 2014 |112|
A Robust Watermarking Technique Based On Dwt on Digital Images
Note that the embedding process does not require repeat. Furthermore, the sequence idx of embedding
locations should keep as the secret key for subsequent watermark extraction. The watermark embedding block
diagram is shown as Fig. 1.4.

Original
image

HL

LL

LL

DWT

0
IDWT

LH

HH

0

0

Reference
image

Difference image

Key locations
s<d(i,j)<t
Watermark
Watermarked image
Fig 1.4 The block diagram of watermark embedding process
MATLAB code for watermark embedding
function aw=embedd(w,a,a1,idx,s,t)
[m,n]=size(a);
[p,q]=size(idx);
alpha=round((s+t)/2);
for z=1:1:length(w)
i=idx(z,1);
j=idx(z,2);
if w(1,z)==1
a(i,j)=a1(i,j)+ alpha;
else
a(i,j)=a1(i,j)- alpha;
end
end
aw=a;
end
MATLAB code for watermark extraction
function w=extract(a,a1,idx,n)
for z=1:1:n
i=idx(z,1);
j=idx(z,2);
if a(i,j)>=a1(i,j)
w(1,z)=1;
end
if a(i,j)< a1(i,j)
w(1,z)=0;
end
end

| IJMER | ISSN: 2249–6645 |

www.ijmer.com

| Vol. 4 | Iss. 1 | Jan. 2014 |113|
A Robust Watermarking Technique Based On Dwt on Digital Images
IV.

OUTPUT IMAGES

In the following experiments, two gray-level images with size of 256 by 256, Lena is as the test image.
The watermark is a pseudo random bit-sequence with length of 1000 bits generated by using the seed number
250. We choose   7 to balance the trade off between the robustness and imperceptibility.

Fig 1.7 Modified DWT Image

Fig 1.8 IDWT Image

Fig 1.10 Watermarked Image

Fig 1.9 Difference Image

V. CONCLUSION
Although the above scheme provides the characteristic of robustness and imperceptibility, but the
embedding process is quite time-consuming. Besides, the original image is required in the watermark extraction
process which is impractical in real application. The concept of Joo et al.’s scheme and propose a robust
watermark scheme using self-reference image. By transforming the original image in wavelet domain and
embedding a watermark in the difference values between the original image and its reference image, the
proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain.
Besides, the watermark embedding does not require repeat in the watermark embedding process and we can use
a secure encryption algorithm, such as RSA, to increase security of the proposed scheme. The watermark
extraction also does not require the original image so the application is more practical in real application for
ownership verification. The experimental results show that the proposed technique provides good image quality
| IJMER | ISSN: 2249–6645 |

www.ijmer.com

| Vol. 4 | Iss. 1 | Jan. 2014 |114|
A Robust Watermarking Technique Based On Dwt on Digital Images
and robust to various attacks. In summary, the proposed method has the following contributions. Firstly, the
watermark extraction process does not require the original image. Thus, it may be applied easily to Internet.
Secondly, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the
spatial domain. Thirdly, the embedded watermark can survive under various attacks.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]

D.-C. Lou, J.-L. Liu, A robust watermarking scheme based on the just-noticeable-distortion, Journal of Chung
Cheng Institute of Technology 31 (2) (2003) 11 – 22.
I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE
Transactions on Image Processing 6 (12) (1997) 1673– 1687.
S. Joo, Y. Suh, J. Shin, H. Kikuchi, S.-J. Cho, A new robust watermark embedding into wavelet DC components,
ETRI Journal 24 (5) (2002) 401–404.
C.-T. Hsu, J.-L. Wu, Multi resolution watermarking for Digital image, IEEE Transactions on Circuits and Systems,
2, Analog and Digital Signal Processing 45 (8) (1998) 1097– 1101.
C.-S. Lu, S.-K. Huang, C.-J. Sze, M. Liao, Cocktail watermarking for digital image protection, IEEE Transactions
on Multimedia 2 (4) (2000) 209–224.
W. Zeng, B. Liu, A statistical watermark detection technique without using original images for resolving rightful
ownerships of digital images, IEEE Transactions on Image Processing 8 (11) (1999) 1534–1548.
S. Stankovic, I. Djurovic, I. Pitas, Watermarking in the space/spatial-frequency domain using two-dimensional
Radon–Wigner distribution, IEEE Transactions on Image Processing 10 (4) (2001) 650– 658.
M.-S. Hsieh, D.-C. Tseng, Y.-H. Huang, Hiding digital watermarks using multi resolution wavelet transform, IEEE
Transactions on Industrial Electronics 48 (5) (2001) 875–882
S.-C. Chu, J.F. Roddick, Z.-M. Lu, J.-S. Pan, A digital image watermarking method based on labeled bisecting
clustering algorithm, IEICE Transactions on Fundamentals E87-A (1) (2004) 282–285.
Peter H.W. Wong, Oscar C. Au, Y.M. Yeung, A novel blind multiple watermarking technique for images, IEEE
Transactions on Circuits and Systems for Video Technology 13 (8) (2003) 813– 830.

| IJMER | ISSN: 2249–6645 |

www.ijmer.com

| Vol. 4 | Iss. 1 | Jan. 2014 |115|

Mais conteúdo relacionado

Mais procurados

Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
International Journal of Science and Research (IJSR)
 

Mais procurados (17)

Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
F010413438
F010413438F010413438
F010413438
 
Region Based Undectable Multiple Image Watermarking
Region Based Undectable Multiple Image WatermarkingRegion Based Undectable Multiple Image Watermarking
Region Based Undectable Multiple Image Watermarking
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
B010510613
B010510613B010510613
B010510613
 
I43014752
I43014752I43014752
I43014752
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 

Destaque

Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
Ap32692697
Ap32692697Ap32692697
Ap32692697
IJMER
 
Steady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaSteady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in Nigeria
IJMER
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
IJMER
 
Cn3210001005
Cn3210001005Cn3210001005
Cn3210001005
IJMER
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
IJMER
 
Dg31497503
Dg31497503Dg31497503
Dg31497503
IJMER
 
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
IJMER
 

Destaque (20)

Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Great Pyramid of Giza and Golden Section Transform Preview
Great Pyramid of Giza and Golden Section Transform PreviewGreat Pyramid of Giza and Golden Section Transform Preview
Great Pyramid of Giza and Golden Section Transform Preview
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of  Deltaic EcologyHydrological Modeling of Upper Indus Basin and Assessment of  Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
 
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution in Packed Column
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution  in Packed Column Absorption of Nitrogen Dioxide into Sodium Carbonate Solution  in Packed Column
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution in Packed Column
 
On Contra – RW Continuous Functions in Topological Spaces
On Contra – RW Continuous Functions in Topological SpacesOn Contra – RW Continuous Functions in Topological Spaces
On Contra – RW Continuous Functions in Topological Spaces
 
Ap32692697
Ap32692697Ap32692697
Ap32692697
 
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionContact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
 
Steady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaSteady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in Nigeria
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
 
A Bayesian Probit Online Model Framework for Auction Fraud Detection
A Bayesian Probit Online Model Framework for Auction Fraud DetectionA Bayesian Probit Online Model Framework for Auction Fraud Detection
A Bayesian Probit Online Model Framework for Auction Fraud Detection
 
Cn3210001005
Cn3210001005Cn3210001005
Cn3210001005
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
 
Performance Analysis of the Constructed Updraft Biomass Gasifier for Three Di...
Performance Analysis of the Constructed Updraft Biomass Gasifier for Three Di...Performance Analysis of the Constructed Updraft Biomass Gasifier for Three Di...
Performance Analysis of the Constructed Updraft Biomass Gasifier for Three Di...
 
Dg31497503
Dg31497503Dg31497503
Dg31497503
 
Determination of Stress Intensity Factor for a Crack Emanating From a Rivet ...
Determination of Stress Intensity Factor for a Crack Emanating  From a Rivet ...Determination of Stress Intensity Factor for a Crack Emanating  From a Rivet ...
Determination of Stress Intensity Factor for a Crack Emanating From a Rivet ...
 
Design &Analysis of Pure Iron Casting with Different Moulds
Design &Analysis of Pure Iron Casting with Different MouldsDesign &Analysis of Pure Iron Casting with Different Moulds
Design &Analysis of Pure Iron Casting with Different Moulds
 
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
 

Semelhante a A Robust Watermarking Technique Based On Dwt on Digital Images

Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422
IJRAT
 

Semelhante a A Robust Watermarking Technique Based On Dwt on Digital Images (20)

B011110614
B011110614B011110614
B011110614
 
1709 1715
1709 17151709 1715
1709 1715
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
M0262076085
M0262076085M0262076085
M0262076085
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
50120140506015
5012014050601550120140506015
50120140506015
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 

Mais de IJMER

Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 

Mais de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

A Robust Watermarking Technique Based On Dwt on Digital Images

  • 1. International OPEN Journal ACCESS Of Modern Engineering Research (IJMER) A Robust Watermarking Technique Based On Dwt on Digital Images B. Mohan Swaroop, Assistant Professor, Potti Sriramulu Chalavadi Mallikharjunarao College of Engg & Tech ABSTRACT: In this paper a robust watermark scheme for copyright protection is proposed. By modifying the original image in transform domain and embedding a watermark in the difference values between the original image and its reference image, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain. Besides the watermark extraction does not require the original image so it is more practical in real application. The experimental results show that the proposed scheme provides not only good image quality, but also robust against various attacks such as compression and noise addition. Many image transforms have been considered and the most prominent among them us the discrete cosine transform (DCT) which has also been favored in the early image and coding standards. Hence, there is a large number of watermarking algorithms that use either a block based or global DCT. But the disadvantage in DCT is that it has only frequency resolution and no time resolution. A new multi resolution watermarking method for digital images has been introduced. Wavelets are mathematical functions that cut the data into different frequency components and then study each component with a resolution matched to its scale. The method is based on the discrete wavelet transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image. It is more robust to proposed methods to some common image distortions, such as image compression, image rescaling/stretching. Keywords: Digital Watermarking, Discrete wavelet transform, Information security, Encryption, Stegonagraphy. I. INTRODUCTION A great deal of information is now being created, stored, and distributed in digital form. Newspapers, and magazines, for example, have gone online to provide real-time coverage of stories with high-quality audio, still images, and even video sequences. The growth in use of public networks such as the Internet has further fueled the online presence of publishers by providing a quick and inexpensive way to distribute their work. The explosive growth of digital media is not limited to news organizations, however. Commercial music may be purchased and downloaded off of the Internet, stock photography vendors digitize and sell photographs in electronic form, and Digital Versatile Disc (DVD) systems provide movies with clear images and CD quality sound. Unfortunately, media stored in digital form are vulnerable in a number of ways. First of all, digital media may be simply copied and redistributed, either legally or illegally, at low cost and with no loss of information. In addition, today's fast computers allow digital media to be easily manipulated, so it is possible to incorporate portions of a digital signal into one's own work without regard for copyright restrictions placed upon the work. Encryption is an obvious way to make the distribution of digital media more secure, but often there is no way to protect information once it has been decrypted into its original form. The ability for pirates to easily copy works is one of the last hurdles that keep publishers from completely adopting online distribution systems. Digital watermarking is seen as a partial solution to the problem of securing copyright ownership. Essentially, watermarking is defined as the process of embedding sideband data directly into the samples of a digital audio, image, or video signal. Sideband data is typically “extra” information that must be transmitted along with a digital signal, such as block headers or time synchronization markers. It is important to realize that a watermark is not transmitted in addition to a digital signal, but rather as an integral part of the signal samples. The value of watermarking comes from the fact that regular sideband data may be lost or modified when the digital signal is converted between formats, but the samples of the digital signal are (typically) unchanged. | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 1 | Jan. 2014 |110|
  • 2. A Robust Watermarking Technique Based On Dwt on Digital Images The earliest forms of information hiding can actually be considered to be highly crude forms of privatekey cryptography; the “key” in this case being the knowledge of the method being employed (security through obscurity). Steganography books are filled with examples of such methods used throughout history. Greek messengers had messages tattooed into their shaved head, concealing the message when their hair finally grew back. Wax tables were scraped down to bare wood were a message was scratched. Once the tablets were rewaxed, the hidden message was secure. Over time these primitive cryptographic techniques improved, increasing speed, capacity and security of the transmitted message. II. WATERMARKING Although steganography and watermarking both describe techniques used for covert communication, steganography typically relates only to covert point to point communication between two parties. Steganographic methods are not robust against attacks or modification of data that might occur during transmission, storage or format conversion. Watermarking, as opposed to steganography, has an additional requirement of robustness against possible attacks. An ideal steganographic system would embed a large amount of information perfectly securely, with no visible degradation to the cover object. An ideal watermarking system, however, would embed an amount of information that could not be removed or altered without making the cover object entirely unusable. As a side effect of these different requirements, a watermarking system will often trade capacity and perhaps even some security for additional robustness. The working principle of the watermarking techniques is similar to the steganography methods. A watermarking system is made up of a watermark embedding system and a watermark recovery system. The system also has a key which could be either a public or a secret key. The key is used to enforce security, which is prevention of unauthorized parties from manipulating or recovering the watermark. The embedding and recovery processes of watermarking are shown in below figures. Watermark W Cover object C Digital watermark Watermarked data W Secret / Public Key K Fig-1.1 Digital watermarking – Embedding/Encryption For the embedding process the inputs are the watermark, cover object and the secret or the public key. The watermark used can be text, numbers or an image. The resulting final data received is the watermarked data W. Cover object C Watermarked data W Watermark detection Watermarked data W Secret / Public Key K Fig-1.2 Digital watermarking – Decoding The inputs during the decoding process are the watermark or the original data, the watermarked data and the secret or the public key. The output is the recovered watermark W. III. THE PROPOSED SCHEME The proposed scheme utilizes the concept of Joo et al.’s scheme to embed a watermark into an image. Motivation for the proposed scheme In 2002, Joo et al. proposed a robust watermark scheme by embedding a watermark into wavelet low frequency sub-band. It is briefly introduced as follows. First, an image with size of 512 by 512 pixels is transformed into wavelet coefficients by three-level wavelet transform and extract the sub-band LL 3 . The | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 1 | Jan. 2014 |111|
  • 3. A Robust Watermarking Technique Based On Dwt on Digital Images extracted sub-band LL 3 is further decomposed into four sub-bands and then three high frequency sub-bands LH 4 , HL4 , HH 4  are set to zero. Fig. 1.3 Three-level wavelet decomposition of an image After performing inverse wavelet transform, its reference sub-band ' LL3 is obtained. The information idx of embedding location in the watermark embedding process is obtained by sorting LL3  LL3 . Finally, the '    watermark information is embedded into the sub band LL 3 by LL3  LL3  k  w idx i , where k is a factor for controlling embedding intensity and w is a pseudo-random binary sequence with the length of 1000 bits generated by using a seed, w belongs to{1,1}. Besides, due to the fact that change to LL 3 values also cause ' ' some change to its reference LL3 values, hence, the embedding process is repeated. As the embedding process is repeated, the image quality is decreased but its reliability is increased. In watermarking extraction process, the original image is required for obtaining the watermark embedding location. According to the embedding location, the watermark can be extracted by comparing the ' two sub-bands LL 3 and LL3 . Finally, the extracted watermark is compared with the original watermark by similarity measure formula. We know that, for an image, most of energy is concentrated on low-frequency and human eyes are sensitive to the change of low-frequency. Although the above scheme provides the characteristics of robustness and imperceptibility, but the embedding process is quite time-consuming. Besides, the original image is required in the watermark extraction process, which is impractical in real application. The watermark embedding The original image X is a gray-level image with M by N pixels. The watermark W is a pseudo random bit-sequence generated by using a seed. They are defined as follows: X  xi, j  0  i  M 1,0  j  N 1,0  xi, j   255  and W  wk 1  k  n, wk  ,1   1 First, the original image is modified in transform domain. Then, a watermark is embedded into the original image according to the difference values between the original image and its reference image. Input: An original image X and watermark W . Output: A watermarked image X w and a sequence idx of embedding location. 1. 2. 3. 4. Step 1: Transform the original image into wavelet coefficients by one-level wavelet transform. Step 2: Set three high-frequency sub-bands LH 1 , HL1 and HH 1 to zero. Step 3: Perform inverse wavelet transform and obtain its reference image. ' Step 4: Compute the differences between the original image X and its reference image X . Then obtain location idxi, j  such that s  xi, j   x ' i, j   t , where s and t  Z  . 5. Step 5: According to the result of Step 4, randomly select some locations to embedding. The watermark is embedded as follows. | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 1 | Jan. 2014 |112|
  • 4. A Robust Watermarking Technique Based On Dwt on Digital Images Note that the embedding process does not require repeat. Furthermore, the sequence idx of embedding locations should keep as the secret key for subsequent watermark extraction. The watermark embedding block diagram is shown as Fig. 1.4. Original image HL LL LL DWT 0 IDWT LH HH 0 0 Reference image Difference image Key locations s<d(i,j)<t Watermark Watermarked image Fig 1.4 The block diagram of watermark embedding process MATLAB code for watermark embedding function aw=embedd(w,a,a1,idx,s,t) [m,n]=size(a); [p,q]=size(idx); alpha=round((s+t)/2); for z=1:1:length(w) i=idx(z,1); j=idx(z,2); if w(1,z)==1 a(i,j)=a1(i,j)+ alpha; else a(i,j)=a1(i,j)- alpha; end end aw=a; end MATLAB code for watermark extraction function w=extract(a,a1,idx,n) for z=1:1:n i=idx(z,1); j=idx(z,2); if a(i,j)>=a1(i,j) w(1,z)=1; end if a(i,j)< a1(i,j) w(1,z)=0; end end | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 1 | Jan. 2014 |113|
  • 5. A Robust Watermarking Technique Based On Dwt on Digital Images IV. OUTPUT IMAGES In the following experiments, two gray-level images with size of 256 by 256, Lena is as the test image. The watermark is a pseudo random bit-sequence with length of 1000 bits generated by using the seed number 250. We choose   7 to balance the trade off between the robustness and imperceptibility. Fig 1.7 Modified DWT Image Fig 1.8 IDWT Image Fig 1.10 Watermarked Image Fig 1.9 Difference Image V. CONCLUSION Although the above scheme provides the characteristic of robustness and imperceptibility, but the embedding process is quite time-consuming. Besides, the original image is required in the watermark extraction process which is impractical in real application. The concept of Joo et al.’s scheme and propose a robust watermark scheme using self-reference image. By transforming the original image in wavelet domain and embedding a watermark in the difference values between the original image and its reference image, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain. Besides, the watermark embedding does not require repeat in the watermark embedding process and we can use a secure encryption algorithm, such as RSA, to increase security of the proposed scheme. The watermark extraction also does not require the original image so the application is more practical in real application for ownership verification. The experimental results show that the proposed technique provides good image quality | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 1 | Jan. 2014 |114|
  • 6. A Robust Watermarking Technique Based On Dwt on Digital Images and robust to various attacks. In summary, the proposed method has the following contributions. Firstly, the watermark extraction process does not require the original image. Thus, it may be applied easily to Internet. Secondly, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain. Thirdly, the embedded watermark can survive under various attacks. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] D.-C. Lou, J.-L. Liu, A robust watermarking scheme based on the just-noticeable-distortion, Journal of Chung Cheng Institute of Technology 31 (2) (2003) 11 – 22. I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing 6 (12) (1997) 1673– 1687. S. Joo, Y. Suh, J. Shin, H. Kikuchi, S.-J. Cho, A new robust watermark embedding into wavelet DC components, ETRI Journal 24 (5) (2002) 401–404. C.-T. Hsu, J.-L. Wu, Multi resolution watermarking for Digital image, IEEE Transactions on Circuits and Systems, 2, Analog and Digital Signal Processing 45 (8) (1998) 1097– 1101. C.-S. Lu, S.-K. Huang, C.-J. Sze, M. Liao, Cocktail watermarking for digital image protection, IEEE Transactions on Multimedia 2 (4) (2000) 209–224. W. Zeng, B. Liu, A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images, IEEE Transactions on Image Processing 8 (11) (1999) 1534–1548. S. Stankovic, I. Djurovic, I. Pitas, Watermarking in the space/spatial-frequency domain using two-dimensional Radon–Wigner distribution, IEEE Transactions on Image Processing 10 (4) (2001) 650– 658. M.-S. Hsieh, D.-C. Tseng, Y.-H. Huang, Hiding digital watermarks using multi resolution wavelet transform, IEEE Transactions on Industrial Electronics 48 (5) (2001) 875–882 S.-C. Chu, J.F. Roddick, Z.-M. Lu, J.-S. Pan, A digital image watermarking method based on labeled bisecting clustering algorithm, IEICE Transactions on Fundamentals E87-A (1) (2004) 282–285. Peter H.W. Wong, Oscar C. Au, Y.M. Yeung, A novel blind multiple watermarking technique for images, IEEE Transactions on Circuits and Systems for Video Technology 13 (8) (2003) 813– 830. | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 1 | Jan. 2014 |115|