Professional Documents
Culture Documents
Abstract— It became an important issue to protect the nature and linear complexity [5]. The adaptive nature applies
ownership and prevent unauthorized access. A blind and to the variation in watermark size. Adaptive dual
reversible watermarking technique is introduced in this work. watermarking methods embed watermark image bits into the
The watermark will be generated from the host image and solitary vectors of the sub-bands of contourlet output.
owner identity. Gray Level Co-occurrence Matrix can be used However this method is not robust against motion blur
for key generation. Contourlet Transform is used to partition attacks and salt & pepper noise [6].
the image into multiple sub-bands. Principal Component
Analysis is used to identify the appropriate bands that can be In the presented work, an efficient watermarking
used for embedding the watermark. For the extraction of approach incorporating Contourlet Transform (CT), Gray
watermark, secret key and ownership id are required. This Level Co occurrence Matrix (GLCM) and Principal
technique ensures superior performance in contrast with other Component Analysis (PCA) is introduced. This paper is
techniques while calculating Bit Error Rate and Peak Signal to arranged in the following order. Section I provides
Noise Ratio. introduction, Section II provides a detailed explanation on
the proposed methodology. A detailed discussion on
Keywords— Watermarking, Gray Level Co-occurrence experimental results is given in III section and finally IV
Matrix, Contourlet Transform, Principal Component Analysis, section displays the conclusion of the paper.
Peak Signal to Noise Ratio, Secret Key.
II. Me t h o d o l o g y
I. In t r o d u c t i o n
A blind watermarking approach specifically for color
A digital image is a set of pixels, and can be easily
images is introduced through the combination of spatial and
captured with the help of cameras or scanners. With the
frequency domain characteristics. The watermark is added to
increment in the usage of internet and expansion of imaging
the low frequency sub-bands which are less correlated. The
devices, the distribution and access of digital images have
authentication of watermark is performed in the blind mode.
become popular. But, majority of these distribution and
The functional block diagram of proposed color image
access may be unauthorized. A secure validation system is
watermark embedding method is illustrated in Fig 1.
necessary to assure the ownership of digital image in
circumstances where the originality of an image can get
questioned.
A commonly used scheme for watermarking is the
histogram based approach [1]. Pre-calculated histogram
values are utilized to embed watermark. The major objective
of this technique is a way to provide better allocation of
intensities on a histogram. This allows lower contrast areas
in the image areas to attain higher contrast. The principle
behind transform based approaches is to embed the given
watermark into the transformed domain coefficients of the
host image. Inverse of the applied transform is taken to
generate the final watermarked image [2]. Discrete Cosine
Transform (DCT) associated watermark embedding
terminologies [3] provided good robustness against common
attacks. But, random spread of noise over the DCT
coefficients affects the extraction process adversely. Here
watermark was added on the radius of the magnitude of
Fourier transform [4] so as to maximize the PSNR value and
minimize quality degradation. The radius of watermark alters
according to the image size and therefore it is image
dependent. This method offers security, device
independence, adaptability and robustness. But, the
watermark is comprised of circular dots occurred due to
random noise and this will result in low capacity. Discrete
Wavelet Transform (DWT) is generally applied for obtaining Fig. 1. Watermark Embedding Process
robust color image watermarking because of its, adaptive
Authorized licensed use limited to: ULAKBIM-UASL - Gumushane University. Downloaded on April 30,2021 at 08:07:47 UTC from IEEE Xplore. Restrictions apply.
In this method, GLCM is generated for individual of the moment (M) are computed from the GLCM of cover
channels of the color host image. GLCM calculates the image (I). Mean of the eigen values are used as secret key
repetition of occurrence of pixel having intensity i (K). In this step, a random number (R) is used for host
horizontally adjacent to pixel with intensity j. The secret key image owner identification.
calculated from the GLCM is utilized as a seed in the M = G x GT
watermark generation process. Contourlet transform provides (i)
flexibility in presenting multi resolution image presentation
i
as shown in Fig. 2. CT contributes adequate description in (2)
II
.....*n ]
<N
spatial as well as directional resolutions. The primary phases
in this transform are Laplacian Pyramid (LP) and Directional
..... + e n
Filter Bank (DFB). Less correlated sub bands obtained from (3)
the CT are used for embedding watermark with the help of n
PCA.
The watermark (w) is generated by concatenating the
binary of key (y) and binary of owner id (s).
w = y || 5 (4)
WL = L b © w; WH = L h © w (6)
642 2021 7th International Conference on Electrical Energy Systems (ICEES 2021)
Authorized licensed use limited to: ULAKBIM-UASL - Gumushane University. Downloaded on April 30,2021 at 08:07:47 UTC from IEEE Xplore. Restrictions apply.
The procedure for extracting the watermark is illustrated image using naked eye. Higher PSNR leads to the increment
in Fig 3. This hybrid method requires only secret key (K) in the quality of watermarked images.
and the identification number (R) of the user for watermark
extraction and hence it is a blind scheme. The watermark TABLE II. P e r f o r m a n c e C o m pa r is o n
(w) is estimated with the help of K and R . At the extraction
stage, the watermarked color image is split into R, G and B M ethodology PSNR BER
channels. The uncorrelated sub bands Wl and Wh are Scale-Space + Contourlet [7] 38.93 6.84
provided by the application of CT and PCA. XOR operation Multistage Contourlet [8] 42.82 5.93
with W can obtain the watermark w ’. Proposed (Contourlet + PCA) 46.22 3.52
III. Re s u l t s a n d Di s c u s s io n s
Methodology
2021 7th International Conference on Electrical Energy Systems (ICEES 2021) 643
Authorized licensed use limited to: ULAKBIM-UASL - Gumushane University. Downloaded on April 30,2021 at 08:07:47 UTC from IEEE Xplore. Restrictions apply.
Re f e r e nc e s [5] H. A. Al-Otum and A. O. Al-Taba’a, , “Adaptive color image
watermarking based on a modified improved pixel-wise masking
technique,” Computers & Electrical Engineering, vol. 35(5), pp. 673-
[1] S. Xiang and J. Huang, “Histogram-based audio watermarking against 695, 2009.
time-scale modification and cropping attacks,” IEEE Transactions on [6] E. Najafi and K. Loukhaoukha, “Hybrid secure and robust image
Multimedia, vol. 9(7), pp. 1357-1372, 2007. watermarking scheme based on SVD and sharp frequency localized
[2] X. Y. Wang, S. Y. Zhang, T. T. Wen, H. Y. Yang and P. P. Niu, contourlet transform”. Journal o f information security and
“Coefficient difference based watermark detector in nonsubsampled applications, vol. 44, pp. 144-156, 2019.
contourlet transform domain,” Information Sciences, vol. 503, pp. [7] F. Etemad and M. Amirmazlaghani, “A new multiplicative watermark
274-290, 2019. detector in the contourlet domain using Location-Scale distribution,”
[3] J. C. Patra, J. E. Phua, and D. Rajan, “DCT domain watermarking Pattern Recognition, vol. 77(1), pp. 99-112, 2018.
scheme using Chinese Remainder Theorem for image authentication,” [8] S. Ranjbar, F. Zargari and M. Ghanbari, “A highly robust two-stage
In IEEE International Conference on Multimedia and Expo, pp. 111- contourlet-based digital image watermarking method,” Signal
116, 2010. Processing: Image Communication, vol. 28(10), pp. 1526-1536, 2018.
[4] A. Poljicak, L. Mandic, L and D. Agic, “Discrete Fourier transform-
based watermarking method with an optimal implementation radius,”
Journal o f Electronic Imaging, vol. 20(3), pp. 333-345, 2011.
644 2021 7th International Conference on Electrical Energy Systems (ICEES 2021)
Authorized licensed use limited to: ULAKBIM-UASL - Gumushane University. Downloaded on April 30,2021 at 08:07:47 UTC from IEEE Xplore. Restrictions apply.