Professional Documents
Culture Documents
Hurrah 2017
Hurrah 2017
Abstract— This paper proposes an efficient watermarking images. Watermarking advances have conveyed efficient
scheme based on hybrid transform domain. The watermarking development in health management systems [4,5].
scheme is blind, robust and secure. The scheme has been developed
to withstand dual attacks which may be combination of signal Currently a lot of work is being done for making
processing and geometric attacks. For achieving the said goals, a watermarking systems robust in order to achieve copyright
single watermark has been embedded in all the three components
protection and secure communication. The effectiveness of
(RGB) of the color image using a new interblock differencing
method in discrete cosine transform (DCT) domain. Discrete the watermarking system is determined by properties like
wavelet transform (DWT) is used prior to embedding in order to get robustness, imperceptivity, security, computational
LL sub-band from each of the three color image components. The complexity and capacity. The watermarking scheme is said
principle of maximum probability is applied to select the watermark to be robust, if the watermarking data secretly embedded can
bit after extracting the watermark from the three components of the be extracted to a significant level even after exposed to
color image. Multiple encryption techniques have also been
employed in order to increase the security of the watermark. The
various signal processing attacks. The imperceptivity of the
experimental results prove that the proposed scheme is highly scheme is determined by the level up to which host
robust to almost all kind of signal processing attacks including information is unaffected after embedding the watermark.
geometric attacks like rotation, cropping and resizing. Also the Similarly, the capacity is determined by number of bits that
watermarked image is subjected to two simultaneous attacks one can be embedded into original data without distorting the
after other to prove the robustness of the scheme to dual attacks. significant information.
The results hence obtained for different attacks are presented in
terms of parameters like PSNR, NCC, BER and BCE to test the Several techniques have been proposed in literature for
performance of the scheme. copyright protection and data integrity which are either
implemented in spatial domain and in transform domain. In
Keywords— Robust watermark, Blind Watermark, Arnold cat
transform domain most popularly used techniques are DCT,
map; Chaos encryption
DWT, singular value decomposition (SVD) and integer
I. INTRODUCTION wavelet transform (IWT).
The ease of communication using internet has converted Spatial domain techniques are usually used for fragile
the world into a global village. This ease of communication, watermarking because their robustness is low for most signal
however, poses a serious threat to data integrity and data processing attacks. An imperceptible watermarking scheme
privacy. The copyright and authentication issues also creep in spatial domain for color images has been proposed in [6].
in due to the fact that digital content like images, text, audio The scheme shows efficient imperceptivity but the robustness
or video can be easily copied, modified and circulated as required for copyright protection is not up to the mark.
illegally with the present day multimedia technology. In such There has been no provision for security of the watermark to
a scenario, techniques are required to take care of the issues be embedded and performance against geometric attacks is
encountered by the industry so as to protect the Intellectual very poor.
Property Rights (IPR) and authenticate the data. A variety of The advantages of the spatial and transform domain can
methods used for the purpose are steganography, also be combined to improve the results of the watermarking
watermarking and encryption [1-3]. Digital image algorithm. The concept of DCT domain to calculate the DC
watermarking, deals with embedding a special data coefficients of 8x8 blocks extracted from luminance
(watermark) in a cover medium, is the most viable solution component of host image directly in spatial domain without
to take care of IPR and content authentication. Watermarking using DCT transform has been used in [7]. The robustness of
has found a niche role in healthcare systems, defense sector, the scheme is good for various attacks excluding geometric
multimedia industry etc., as an instrument for the protection attacks where the performance is very low.
of information, for secure sharing and handling of digital
A blind and digital image watermarking scheme in DWT-
SVD domain has been proposed in [8]. The robustness of the
scheme is achieved by embedding watermark in all four sub- and the encrypted logos are shown in Fig. 1. The application
bands of the cover image after performing two level DWT of double layer encryption using Arnold and chaos cat maps
operation on it. Although the authors claim the scheme to be before embedding makes the watermark information highly
robust against various attacks but the values of the parameters secure.
like NCC and BER are not recorded to prove the point. Also
the scheme is less secure and computationally complex. A
blind watermarking scheme based on differential embedding
has been proposed for gray-scale images in DWT and DCT
domains [9]. The scheme performs well for most of the signal
processing attacks in terms of imperceptivity and robustness
but the robustness has only been analyzed in case of
Color Image Watermark(WM) Encrpted WM
geometric attacks for a very narrow range. Also scheme is
only valid for gray-scale image and not currently trending
color images and there has been no provision for security of Fig.1. Original and Encrypted watermark
the watermark.
B. Data Embedding
There are several other techniques proposed that use The working of the proposed algorithm is shown in Fig. 2.
encryption techniques in order to enhance security of the The main steps of the scheme are described in following steps:
watermarking system. The algorithm proposed in [10] proves
to be secure and robust but has been tested only for salt and Step 1: The first step is to divide the original color image
pepper noise and its performance against other signal into red(R), green(G) and blue(B) components.
processing attacks is not analyzed. Similarly, a much Step 2: A DWT (1 level) on each of the three color
improved robust watermarking scheme implemented in the components to get four frequency sub-bands of the respective
DCT domain has been proposed in [11]. The technique components, i.e., LL, LH, HL and HH.
employs efficient inter-block differencing method to achieve
high perceptual quality and robustness. But the limitation of Step 3: Take the LL component of each DWT
the scheme is that there is no provision for security of the transformed component and divide it into 4x4 sub-blocks.
watermark The techniques implemented using transform For embedding the four watermark bits select four 4x4 sub-
domain techniques have proven to be most robust against all blocks at each embedding cycle. These four blocks are
of the signal processing attacks. An artificial bee colony represented by B1, B2, B3 and B4.
(ABC) concept has been used to increase the security of a
watermarking technique based on DWT and SVD domains
[12]. The proposed technique proves to be quite secure but
the imperceptivity is poor and there is much more room for
increasing robustness. Similar other robust image
watermarking techniques have been proposed in literature for
copyright protection and other security applications. [13,14].
The main areas of concern of these techniques are
multimedia, defense and health care applications.
In this paper, we propose a blind, secure and robust digital
image watermarking scheme based on DCT and DWT
techniques for copyright protection. The algorithm has been
tested for color images in which watermark is embedded
using its RGB space. The security of the watermark in the
proposed technique has been increased with the help of two
encryption techniques, Arnold cat map and chaos encryption.
Fig. 2. Block Diagram of Embedding
II. PROPOSED ALGORITHM
A watermarking algorithm has three main phases which Step 4: Perform block level DCT transform on each
include watermark generation phase, watermark embedding selected 4x4 sub-block. Let the DCT coefficients of four
phase and watermark extracting phase. The proposed scheme blocks be represented by CB1(x, y), CB2(x, y), CB3(x, y), and
uses 64 × 64 binary image watermark logo W, and a color CB4(x, y). Where ‘x’ gives row position and ‘y’ gives column
image of size of 512 × 512 as cover image. The detailed position of a DC coefficient in a 4x4 sub-block. Before
algorithm is described in the following sub-section. embedding watermark bits select three initial parameters ‘a’,
‘δ’ and ‘∆’. According to the rule described in Table I, a
A. Watermark Generation watermark bit is embedded by pushing the value of the two
The watermark logo ‘W’ is encrypted using Arnold selected DC coefficients in a particular zone.
transform followed chaos encryption methods. The original
22
2017 Fourth International Conference on Image Information Processing (ICIIP)
Table I: Embedding Algorithm has been tested for various geometric attacks like cropping,
resizing, rotation etc.
Embedding Algorithm for one zone.
Fig. 3 shows the original Pepper and Airplane images and
Initialize a, δ and ∆. the corresponding watermarked images in which the
Set CB1(4,3) – CB2(4,4) = d watermark logo has been embedded. The perceptual quality
of the watermarked image is said to be good if its PSNR is
For w(x) = 1; greater than 36dB. The PSNR of the proposed scheme has
If d >= (a + δ) been recorded greater 40 dB which is obviously greater than
cut-off of PSNR.
Begin loop: CB1(4,3) = CB1(4,3) - ∆
Original Image Watermarked Original Image Watermarked
CB2(4,4) = CB2(4,4) + ∆ Image Image
23
2017 Fourth International Conference on Image Information Processing (ICIIP)
The comparison has been performed for the Lena image and
similar results were obtained for the other images like [6] Proposed
baboon, pepper and airplane. 5000
No Attack Median Filtering Gaussian Noise
4000
3000
B.C.E
2000
1000
NCC BER NCC BER NCC BER 0
1 0 0.98 2.19 0.99 0.02
80 70 60 50 40 30 20
Histogram Equalization Low Pass Filtering Weiner Filtering
Quality Factor(QF)
NCC BER NCC BER NCC BER One of the main strengths of the proposed technique is that
0.98 1.855 0.94 5.90 0.98 1.90 it can resist dual attacks as have been shown in the Table III.
JPEG (QF = 80) Crop(Middle 10%) Resizing (400%)
Different attacks have been applied on the watermarked image
simultaneously one after other and the extracted watermark
has been tested for robustness using quality metrics BER and
NCC.
TABLE III. BER AND NCC METRICS OF PROPOSED SCHEME
NCC BER NCC BER NCC BER Attacks Peppers Airplane
0.97 2.00 0.98 1.11 1 0
Fig. 4. Extracted watermarks and corresponding objective metrics. BER NCC BER NCC
o
Rotate (35 ) + Crop 9.88 0.98 10.30 0.98
The results so obtained have been compared with a state (10%)
of art technique and the comparison results are reported in S&P + Crop (25%) 11.40 0.96 11.40 0.96
Table II and Fig. 5, which reveal that the proposed scheme S & P + GN 7.42 0.93 6.20 0.93
outperforms the technique under comparison.
Sharpening + crop 6.30 0.97 14.47 0.94
(10%)
TABLE II. COMPARISON OF PROPOSED SCHEME WITH [6]
S & P + MF 4.41 0.96 4.95 0.95
Attacks Abrahim et. al. Proposed
Rotate (350)+ scale 3.12 0.98 4.02 0.97
B.C.E B.C.E up (200%)
No Attack 4096 4096
Sharpening + Rotate 3.88 0.97 4.55 0.96
S & P Noise 3904 4014 (10o)
Poisson Noise 3516 4080 Rotate (350)+ scale 8.45 0.93 8.76 0.92
down (50%)
Speckle Noise 3494 4082 Rotate (350) + 3.45 0.96 4.19 0.95
Brighten(20)
Avg. Filtering 3700 3854
Rotate (350) + 3.67 0.96 4.05 0.95
Darken(20)
Gaussian LPF 4095 4095
crop (10%) + 3.22 0.97 3.56 0.97
Sharpening 3744 3987 Brighten(20)
Crop 25% 3702 3946 crop (10%) + 2.34 0.97 3.72 0.96
Darken(20)
Crop 50% 2048 3803
MF +Sharpening 4.30 0.96 5.49 0.95
Crop 75% 1024 3730
Resizing 50% 3845 4096 S & P + Sharpening 4.78 0.97 5.03 0.95
24
2017 Fourth International Conference on Image Information Processing (ICIIP)
ACKNOWLEDGMENT
The authors would like to thank the Ministry of
Electronics and Information Technology (MeitY), Govt. of
India, for supporting under Visvesvaraya PHD Scheme and
the Department of Science and Technology (DST) New
Delhi for providing financial support under DST inspire
fellowship scheme.
REFERENCES
[1] H. Nyeem, W. Boles, and C. Boyd, “Digital image watermarking: its
formal model, fundamental properties and possible
attacks,” EURASIP Journal on Advances in Signal Processing. 1-22
(2014).
[2] S. A. Parah, J. A. Sheikh, and G. M. Bhat, “Data hiding in intermediate
significant bit planes, a high capacity blind steganographic technique,”
Emerging Trends in Science, Engineering and Technology
(INCOSET) 2012: 192-197.
[3] S. A Parah, A. Shazia, and A. Ayash, "Robustness analysis of a digital
image watermarking technique for various frequency bands in dct
domain." In Nanoelectronic and Information Systems (iNIS), 2015
IEEE International Symposium on, pp. 57-62. IEEE, 2015.
[4] V. V. Singh, and R. K. Jha, "An overview of robust digital image
watermarking." IETE Technical Review 32, no. 6 (2015): 479-496.
[5] S. A. Parah, J. A. Sheikh, F Ahad, N. A. Loan and G.M. Bhat,
“Information hiding in medical images: a robust medical image
watermarking system for E-healthcare Multimedia Tools and
Applications 76 (8), 10599-10633.
[6] J. Abraham, and P. Varghese, "An imperceptible spatial domain color
image watermarking scheme," Journal of King Saud University-
Computer and Information Sciences (2016).
[7] Q. Su, Y. Niu, Q. Wang, and G. Sheng, "A blind color image
watermarking based on DC component in the spatial domain." Optik-
International Journal for Light and Electron Optics 124, no. 23 (2013):
pp. 6255-6260.
[8] A. Furqan, and M. Kumar, "Study and analysis of robust DWT-SVD
domain based digital image watermarking technique using MATLAB."
In Computational Intelligence & Communication Technology (CICT),
2015 IEEE International Conference on, pp. 638-644. IEEE, 2015.
[9] A. Benoraira, B. Khier, and N. Boucenna, "Blind image watermarking
technique based on differential embedding in DWT and DCT
domains." EURASIP Journal on Advances in Signal Processing 2015,
no. 1 (2015): 55.
[10] S. Rohith, K. N. Hari Bhat, and B. K. Sujatha, "A secure and robust
digital image watermarking scheme using repetition codes for
copyright protection." In Advances in Electronics, Computers and
25