Professional Documents
Culture Documents
Watermarking Project
Watermarking Project
INTRODUCTION
Digital watermarking is a technique which allows an individual to add hidden copyright notices
or other verification messages to digital audio, video, or image signals and documents. Such
hidden message is a group of bits describing information pertaining to the signal or to the author
of the signal (name, place, etc.). The technique takes its name from watermarking of paper or
money as a security measure. Digital watermarking is not a form of steganography, in which data
is hidden in the message without the end user's knowledge, although some watermarking
techniques have the steganography feature of not being perceivable by the human eye.
The enormous popularity of the World Wide Web in the early 1990's demonstrated the
commercial potential of offering multimedia resources through the digital networks. Since
commercial interests seek to use the digital networks to offer digital media for profit, they have a
strong interest in protecting their ownership rights. Digital watermarking has been proposed as
one way to accomplish this.
Invisible watermarks, on the other hand, are potentially useful as a means of identifying the
source, author, creator, owner, and distributor or authorized consumer of a document or image.
For this purpose, the objective is to permanently and unalterably mark the image so that the
credit or assignment is beyond dispute. In the event of illicit usage, the watermark would
facilitate the claim of ownership, the receipt of copyright revenues, or the success of prosecution
[10].
Watermarking has also been proposed to trace images in the event of their illicit redistribution.
Whereas past infringement with copyrighted documents was often limited by the unfeasibility of
large-scale photocopying and distribution, modern digital networks make large-scale
dissemination simple and inexpensive. Digital watermarking makes it possible to uniquely mark
each image for every buyer. If that buyer then makes an illicit copy, the illicit duplication may be
convincingly demonstrated [11].
1
1.3 Types of Watermarks:
Watre Marking
Visible Invisible
Robust Fragile
2
cannot be removed by cropping the center part of the image. Further, such watermarks are
protected against attacks such as statistical analysis[11].
1.3.2 Invisible watermark:
Invisible watermark is hidden in the content. It can be detected by an authorized agency only.
Such watermarks are used for content and/or author authentication and for detecting
unauthorized copier [12].
1.3.3. Public watermark:
Such a watermark can be read or retrieved by anyone using the specialized algorithm. In this
sense, public watermarks are not secure. However, public watermarks are useful for carrying IPR
information. They are good alternatives to labels [13].
1.3.4 Fragile watermark:
Fragile watermarks are also known as tamper-proof watermarks. Such watermarks are destroyed
by data manipulation.
3
The diagram of Watermarking process is as shown below:
User key
Watermark
User key
Watermarked Image
The following two sequences of images demonstrate a typical watermark embedding and
extraction process applied to a static image. It is notable that a slight degradation of the original
image occurs when the watermark is embedded. However, the retrieved watermark is very close
to the original watermark, which can help resolve ownership issues.
Embedding the checksum only changes (on average) half the number of pixel. So less
visual distortion.
4
Extremely simple and fast.
Extremely fragile. Any change to the checksum causes the failure of the verification
procedure.
Entire watermark can be removed by removing the LSB plane. Can’t survive lossy
compression.
1.6 DWT in Image Processing: The discrete wavelet transform (DWT) is a linear
transformation that operates on a data vector whose length is an integer power of two,
transforming it into a numerically different vector of the same length. It is a tool that separates
data into different frequency components, and then studies each component with resolution
matched to its scale. DWT is computed with a cascade of filtering followed by a factor 2 sub
sampling. The Discrete Wavelet Transform (DWT) is used in a wide variety of signal processing
applications. 2-D discrete wavelet transform (DWT) decomposes an image or a video frame into
sub-images, 3 details and 1 approximation. The approximation sub-image resembles the original
on 1/4 the scale of the original. The 2-D DWT is an application of the 1-D DWT in both the
horizontal and the vertical directions. DWT separates the frequency band of an image into a
lower resolution approximation sub-band (LL) as well as horizontal (HL), vertical (LH) and
diagonal (HH) detail components. Embedding the watermark in low frequencies obtained by
wavelet decomposition increases the robustness with respect to attacks that have low pass
characteristics like filtering, lossy compression and geometric distortions while making the
scheme more sensitive to contrast adjustment, gamma correction, and histogram equalization.
Since the HVS is less sensitive to high frequencies, embedding the watermark in high frequency
sub-bands makes the watermark more imperceptible while embedding in low frequencies makes
it more robust against a variety of attacks. It is useful for processing of non-stationary signals.
The transform is based on small waves, called wavelets, of varying frequency and limited
duration. Wavelet transform provides both frequency and spatial description of an image. Unlike
conventional Fourier transform, temporal information is retained in this transformation process.
Wavelets are created by translations and dilations of a fixed function called mother wavelet.
DWT is the multiresolution description of an image the decoding can be processed sequentially
from a low resolution to the higher resolution. The DWT splits the signal into high and low
5
frequency parts. The high frequency part contains information about the edge components, while
the low frequency part is split again into high and low frequency parts. The high frequency
components are usually used for watermarking since the human eye is less sensitive to changes
in edges. In two dimensional applications, for each level of decomposition, we first perform the
DWT in the vertical direction, followed by the DWT in the horizontal direction. After the first
level of decomposition, there are 4 sub-bands: LL1, LH1, HL1, and HH1. For each successive
level of decomposition, the LL subband of the previous level is used as the input. To perform
second level decomposition, the DWT is applied to LL1 band which decomposes the LL1 band
into the four sub To perform third level decomposition, the DWT is applied to LL2 band which
decompose this band into the four sub-bands – LL3, LH3, HL3, HH3. This results in 10 sub-
bands per component. LH1, HL1, and HH1 contain the highest frequency bands present in the
image tile, while LL3 contains the lowest frequency band. DWT is currently used in a wide
variety of signal processing applications, such as in audio and video compression, removal of
noise in audio, and the simulation of wireless antenna distribution. Wavelets have their energy
concentrated in time and are well suited for the analysis of transient, time-varying signals. Since
most of the real life signals encountered are time varying in nature, the Wavelet Transform suits
many applications very well [7].
6
Chapter-2
Review of Literature
Nikita Kashyap, “Image Watermarking Using 3-Level Discrete Wavelet Transform
(DWT)”, 2012
In this paper they introduced [1] about implemented a robust image watermarking technique for
the copyright protection based on 3-level discrete wavelet transform (DWT). In this technique a
multi-bit watermark is embedded into the low frequency sub-band of a cover image by using
alpha blending technique. The insertion and extraction of the watermark in the grayscale cover
image is found to be simpler than other transform techniques. The proposed method is compared
with the 1-level and 2-level DWT based image watermarking methods by using statistical
parameters such as peak-signal-to-noise-ratio (PSNR) and mean square error (MSE). The
experimental results demonstrate that the watermarks generated with the proposed algorithm are
invisible and the quality of watermarked image and the recovered image are improved. In this
paper, an image watermarking technique based on a 3-level discrete wavelet transform has been
implemented. This technique can embed the invisible watermark into salient features of the
image using alpha blending technique. Experiment results shows that the quality of the
watermarked image and the recovered watermark are dependent only on the scaling factors k and
q and also indicate that the three level DWT provide better performance than 1-level and 2-level
DWT. All the results obtained for the recovered images and the watermark are identical to the
original images.
7
watermark can survive well. On the other hand, for the purpose of image authentication, our
approach can locate the part of the image that has been tampered with and tolerate some
incidental processes that have been executed. Experimental results show that the performance of
our multipurpose watermarking scheme is indeed superb in terms of robustness and fragility.
Alberto Martin and Sabri Tosunoglu, “Image Processing Techniques For Machine Vision”,
2000
In this paper [3] they explained about Image Processing Algorithms are the basis for Image
Computer Analysis and Machine Vision. Employing a theoretical foundation – Image Algebra
and powerful development tools – Visual C++, Visual Fortran, Visual Basic, and Visual Java
high-level and efficient Computer Vision Techniques have been developed. This paper analyzes
different Image Processing Algorithms by classifying them in logical groups. In addition,
specific methods are presented illustrating the application of such techniques to the real-world
images. In most cases more than one method is used. This allows a basis for comparison of
different methods as advantageous features as well as negative characteristics of each technique
is delineated.
8
In this paper author [5] described about the proliferation of digitized media due to the rapid
growth of networked multimedia systems, has created an urgent need for copyright
enforcement technologies that can protect copyright ownership of multimedia objects.
Digital image watermarking is one such technology that has been developed to protect
digital images from illegal manipulations. In particular, digital image watermarking
algorithms which are based on the discrete wavelet transform have been widely
recognized to be more prevalent than others. This is due to the wavelets' excellent
spatial localization, frequency spread, and multi-resolution characteristics, which are similar
to the theoretical models of the human visual system. In this paper, they describe an
imperceptible and a robust combined DWT-DCT digital image watermarking algorithm.
The algorithm watermarks a given digital image using a combination of the Discrete
Wavelet Transform (DWT) and the Discrete Cosine Transform(DCT). Performance
evaluation results show that combining the two transforms improved the performance of
the watermarking algorithms that are based solely on the DWT transform.
Surya Pratap Singh, “A Robust Watermarking Approach using DCT-DWT”, 2012
This paper presents [6] a robust watermarking technique for color and grayscale image.
The proposed method involves many techniques to conform a secure and robust
watermarking. In the proposed technique the watermark is embedded in 3 rd level of DWT
(Discrete Wavelet Transform) and before embedding the watermark image is passed
through chaotic encryption process for its security, other important thing is that in the
proposed method watermark is embedded in the form of DCT (Discrete Cosine Transform)
with special coefficient shifting algorithm to minimize the impact on main image. The
performance of the proposed watermarking is robust to a variety of image processing
techniques, such as JPEG compression, enhancement, resizing, and geometric operations.
9
Chapter-3
Present Work
Problem Formulation
With the rapid growth of internet the various digital methods has been proposed to protect the
multimedia information from the non authorized accesses use and change. Among all the
proposed methods the watermarking technique is the most common technique for protecting the
multimedia data for unauthorized access. The water marking methods have been categorized as
spatial domain method and frequency domain method. In spatial domain method we modify the
lower order bits of cover image to embed the water mark. The main advantage of this technique
is of low complexity and less computational values. But this technique is very robust to certain
types of security attacks. The second method is frequency domain transform method. These
methods are based upon the using of some invertible transformations like discrete cosine
transform i.e. DTC. Discrete Fourier transforms (DFT) and Discrete Wavelet Transform (DWT)
to host image. To embed the water mark in the image simply changes the coefficient value of
these transforms according to the watermark and the inverse transform is applied to the original
image. These methods are too complicated and require more computational power. These
methods are also provides more reverts to the security attacks. The another method is single
value decomposition (SVD) technique. I
2. To improve performance of DWT based OS-ELC machine learning algorithm for blind
watermarking
10
3.3 Methodology:
1. To study the various watermarking techniques there are many techniques present. These
various techniques are Discrete Wavelet Transformation, Discrete Cosine Transformation
and singular Value Decomposition.
2. To implement the DCT-SVD technique and analysis the processing time computational
power and robustness of the algorithm against security attack.
4. The enhancement will be made in SVD, DCT, DWT technique by applying Kalman
Filtering to reduce PNSR value and increase robustness of the algorithm.
5. The existing DCT-SVD technique and enhanced DCT-SVD technique will be implement
and results of PNSR value and robustness will be compare graphically and in tabular
form.
2. Gabor Filtering: The images are filtered using the real parts of various different Gabor
filter kernels. The mean and variance of the filtered images are then used as features for
classification, which is based on the least squared error for simplicity.
11
3. Salt and Pepper Filetring: We consider salt-and-pepper noise, for which a certain
amount of the pixels inthe image are either black or white (hence the name of the noise).
Salt-and-pepper noise can, e.g., be used to model defects in the CCD or in the
transmission of the image. Given the probability r (with 0 ≤ r ≤ 1) that a pixel is
corrupted, we can introduce salt-and-pepper noise in an image by setting a fraction of r/2
randomly selected pixels to black, and another fraction of r/2 randomly selected pixels.
Image Processing Toolbox chains a various set of image and their types, together with high
forceful range, embedded ICC profile, topographic andgigapixel resolution. Visualization
functions permit you searches an image, inspect a region of pixels, create histograms, adjust the
contrast and influence regions of interest (ROIs). With toolbox algorithms you can restore ruined
images, explore shapes, analyze textures, adjust color balance and detect and measure features,.
Image Processing Toolbox is included in MATLAB and Simulink Student Version. Its key
features as follows:
Importing and Exporting Images
Displaying and Exploring Images
Post processing Images and Preprocessing
Analyzing Images
Image Registration and Geometric Transformations
12
Working with Large Images
13
REFERENCES
[1] Kashyap, Nikita, and G. R. Sinha. "Image watermarking using 3-level discrete wavelet
transform (DWT)." International Journal of Modern Education and Computer Science
(IJMECS) 4.3 (2012): 50.
[2] Lu, Chun-Shien, and H-YM Liao. "Multipurpose watermarking for image authentication and
protection." Image Processing, IEEE Transactions on 10, no. 10 (2001): 1579-1592.
[3] Martin, Alberto, and Sabri Tosunoglu. "Image processing techniques for machine vision."
Miami, Florida (2000).
[4] Chaturvedi, Navnidhi, and S. J. Basha. "Comparison of Digital Image watermarking Methods
DWT & DWT-DCT on the Basis of PSNR." image 2 (2012): 1.
[5] Al-Haj, Ali. "Combined DWT-DCT digital image watermarking." Journal of computer
science 3, no. 9 (2007): 740.
[6] Singh, Surya Pratap, Paresh Rawat, and Sudhir Agrawal. "A robust watermarking approach
using DCT-DWT." International Journal of Emerging Technology and Advanced Engineering
(ISSN 2250-2459, Volume 2, Issue 8 (2012).
[7] Mansouri, A., A. Mahmoudi Aznaveh, and F. Torkamani Azar. "SVD-based digital image
watermarking using complex wavelet transform." Sadhana 34, no. 3 (2009): 393-406.
[8] Anthony T.S.Ho et.al, “A Robust Digital Image-in-Image Watermarking Algorithm Using
the Fast Hadamard Transform”, Springer, 2011
[9] Alexander Sverdlov, “Secure DCT-SVD Domain Image Watermarking: Embedding Data in
All Frequencies”, Proceedings of IEEE Region 10 Technical Conference on Convergent
Technologies for the Asia-Pacific, Bangalore, India, October 14-17, 2003
[10] T. Serre, L. Wolf, S. Bileschi, M. Riesenhuber, and T. Poggio, “Object recognition with
cortex-like mechanisms,” IEEE Trans. on PAMI vol. 29, no. 3, 2007.
[11] J.-K. Kamarainen, V. Kyrki, and H. K ¨ alvi¨ ainen, “Invariance properties of Gabor filter
based features - overview and applications,” IEEE Trans. on Image Processing, vol. 15, no. 5,
pp. 1088–1099, 2006.
[12] D. Gabor, “Theory of communication,” Journal of Institution of Electrical Engineers, vol.
93, pp. 429–457, 1946.
14
15