Professional Documents
Culture Documents
n
I 2001, Barni et. a1. 1
[ 1] proposed a scheme that exploits
the wavelet domain based texture and luminance character
istics of all image subband to embed the watermark using
Human Visual System ( HV S).The robustness of the wavelet
domain scheme is increased by Dawei et. a1. [12]. In this
scheme the wavelet transform is applied on chaotic logistic
map.This scheme is robust to geometric attacks but sensitive
to filtration and sharping. n
I 2004, Kundur et.a1. [ 5] proposed
scheme that addresses a multi-resolution fusion based logo
watermarking scheme. n
I this scheme, the gray-level logo
image is decomposed using one level decomposition and the
cover image is divided into the blocks of the size equal
to the size of subband of logo image. In fusion process
the four subbands of different orientation of logo image are
I . INTROD UCTION
added to the blocks of same orientation. n
I [13] scheme to
achieve
high
imperceptibility
in
image
watermarking
the HV S
The security and authenticity issues of digital image are
characteristic
are
used
to
select
the
significant
coefficients
of
becoming popular than ever,due to the rapid growth of multi
DWT
decomposed
cover
image.
This
scheme
uses
the
pixel
media and Internet technology. On Internet,digital images are
easily and widely shared among the different users at different wise masking model to calculate the weight factors for the
geographical places. Every day large amount of digital images wavelet coefficients of cover image. The wavelet transform
are transmitted over the Internet in various applications. As decomposes the image into standard subband sets which are
digital technology allows unauthorized reproduction of digital not necessarily the optimal representation for images. The
Singular Value Decomposition (SV D)is numerical technique
images, the protection of the copyrights of digital image is a
for
diagonalizing the image matrices in which transform
very important issue. Image watermarking schemes are used to
domain
consist of basis state that is optimal 1
[ 4].
protect the digital images. Image watermarking is the process
of embedding an imperceptible data w
( atermark) into cover
To achieve high robustness against attacks like Gaussian
image. The image watermarking schemes have been widely noise, compression and cropping the combination of SVD
used to solve the copyright protection problems of digital and DWT are used. In 2006, Liu Liang et. al. 1
[ 6] proposed
image related to illegal usage or distribution 1
[ ]. Several image scheme, where the two-level DWT is applied on the cover
watermarking schemes are proposed, considering different image to produce the different subbands of frequency. The
view points.The image Watermarking schemes are classified selected frequency subband is converted into blocks of each
into different types based on domain of processing, visibility size 4x 4.The SVD is applied on each of these blocks and
of watermark and rigidity of scheme.
the watermark is hided into diagonal matrix of the block.The
Based on the domain of processing, the watermarking combination of DWT- SVD was proposed to insert the water
schemes are classified into two categories: spatial-domain mark into the high frequency subband of cover image [17].
and frequency-domain schemes [2]. Spatial domain schemes This scheme is rigid to different types of image processing
embed the watermark by directly modifying the pixel values operations. n
I 2007, Qiang L. et. al 1
[ 8] proposed a scheme
of the cover image and these schemes are less complex in that decomposes the cover image into K levels subband
computation [3]. On the other hand,transform domain schemes coefficients using DWT. The SVD is applied on subbands
[ 4], [ 5] embed the watermark by modulating the frequency
LH and H Lsubbands and the watermark is embedded into
coefficients in a transformed domain such as,Discrete Cosine these SVD transformed subbands.The rigidity of this scheme
Transform D
( CT) [6],Discrete Fourier Transform D
( FT)and is analyzed considering different types of image processing
Discrete Wavelet Transformation D
( WT) [ 5], [7], [8], [9], 1
[ 0]. operations. n
I few schemes, 1
[ 9] both watermark and cover
978-1- 42 4 4-9799-7/11/$26.00 2011 IEEE
490
LL,
HL,
LH,
HH,
HL,
LH,
HH.
1= USV T
(2 )
491
m/2xn/2
output:The watermarked color image I' of size
mxn.
I.
end
end
AI. + aA
,
m/2xn/2
(3)
II
UISIV I.
6) for l +- 1 to {LL,LH,Hl,HH} do
for i +- 1 to m/2 do
for j +- 1 to n/2 do
Af'
end
end
end
( - AD/a
492
Correlation (NC)
Normalized
NC L:l L:f=l(I[i,j]I'[i,j])
L:l L:f=l(I[i,j])2
I(i,j) is original image and 1'(i,j) is modified
M is height of image and N is width of image.
=
where,
image,
The geometrical invariant property of the proposed scheme
is analysed considering the effect of scaling and rotation on
watermarked Lena image. Figure 5 (a )and 5 (b )shows the effect
of geometrical scaling and rotation attacks on watermarked
Lena color image. The watermark is extracted from four
NI'I'l\'
(b) Watermark
I!!I
- :!IIl
. _!I!_!I!!
! _!I!!_!!I!_
!I!
_ --
!I
c<#". .... n . aD _0
.0
NI'I'l\'
"rI!_!I!
_"",_!!I_
!!!!!!
!!!!I _
!I! i!l.
og. .El.("]:,!) " O _9
(c) Watermark
HI tc-. __ 100II ___ ...
Ol'g. .e.('):!l .. OD _O
NI'I'l\'
NC.
V. CONCLUSION
493
Table :
I N C between extracted and original watermark from Lena image with different types of attacks
arne 0
t e atta
atennar
na Ima e
eet 0 contrast a uslment on
eet 0 auto co or on na
eet 0 retouc on ena
eet 0 tumn on ena
eet 0 s arpemng on na
ect 0 s Ia on na
ect 0 warrru y on ena
m gram on na
eet 0
eet 0 saturation so t on na
urnn on na
eet 0
na
[3]
[4]
[5]
[6]
[7]
[8]
[9]
(g) Saturation
(h) Blurring
[10]
[II]
"
"
[12]
"
03
[ l 3]
:2
10
12
14
16
18
AnglltofRoution
[14]
[15]
[16]
002
004
OIlS
008
01
014
028
032
046
Sullnghctol'
[17]
[18]
[19]
REFERENCES
[1] I.J. Cox, M.L. Miller, 1. A. Bloom, 1. Fridrich, T. Kalker, D
" igital
Watermarking and Steganography",Second edition,Morgan Kaufmann
Publishers,2008.
[2] P. Vidyasagar, H. Song and C. Elizabeth., A
" survey of digital image
watermarking techniques",IEEE 3rd International Conference on Indus-
[20]
[21]