Professional Documents
Culture Documents
Research Process
Digital watermark is defined as the image, audio, sequence of characters, or any data inserted into
signal which tolerates noise. Again, it is used to provide copyright prevention, security and
authentication of owner. The difference between traditional watermark and digital watermark is that
digital watermark is not visible under light or darkness until or unless passed through some
algorithm.
Problem Statement:
Because of the huge use of internet digital materials are accessible to everyone. They use them,
distribute them illegally and claim that these belong to them without the permission of owner. In
order to resolve this case, we introduce the technique to watermark digital content.
Literature Review:
DWT Technique:
The major objectives of the research is robustness and imperceptibility. DWT is selected because in
this according to HVS human visual system, every channel is processed independently. Every
channel has its own bandwidth. Here when the image to be selected as original image is passed by
DWT where an image is decomposed into four sub bands. As lower frequency sub band contains lot
of information about image and the high frequency sub band contains information about textures and
edges. More energy is compact in low frequency sub band where image can be easily distorted but
provides good robustness. Gray scale watermark is embedded into the middle sub band LH and HL
therefore. And hence HL is less sensitive to HVS so therefore this sub band is selected for
embedding. This scheme is robust against Gaussian noise and salt and pepper. The technique which
is used in this paper is to provide robustness without affecting the image quality of cover image as
well as to provide high security plus watermark should be having high capacity.
R.Eswaraiah and E.Sreenivasa Reddy” proposed the hybrid scheme of Discrete Wavelet Transform
(DWT) and Discrete Cosine Transform for digital watermarking technique. The major objectives of
the proposed scheme are to obtain imperceptibility and robustness. The cover image is of RGB color
space. The watermark is of gray scale. The color cover image is split into three color channels. The
blue channel is selected for embedding watermark because it is resistant to changes. The color cover
image is passed through DWT up to 2 levels to decompose the image into LL, HL, LH and HH sub
bands. The HL2 sub band is selected for embedding watermark. The HL2 sub band is divided into
size of 8*8 four blocks. DCT is applied to each block. The watermark image is inputted and DCT is
also applied to watermark image. The DCT coefficients of watermark are embedded into DCT
blocks of HL2 sub band. IDCT and IDWT are applied and all the three channels are recombine with
the extracted one and hence watermarked image is obtained. For extraction, the three channels are
splinted and DWT up to 2 levels are applied. DCT is applied and watermark embedded into DCT
blocks of HL2 sub band is extracted. For measuring the quality of watermarked image the PSNR
“Peak Signal to Noise Ratio” is computed as well as for the measurement of quality of watermark
image the NC Normalized Coefficient is computed. This scheme is robust against Gaussian Noise,
Salt and Pepper, Poisson attack, Gaussian blur, JPEG compression, sharpening and cropping.
Discrete Cosine Transform and Singular Value Decomposition. The cover image is of RGB color
space of size 512*512. The watermark is of gray scale. The objectives of their proposed work are
robustness and capacity. This proposed methodology is 90% robust to attacks except the rotation
attack
SVD
Samira Mabtoul El Hassan Ibn Elhaj and Driss Aboutajdine” proposed the scheme of newly based
transform domain called Dual Tree Complex Wavelet which is found to be better than Discrete
Wavelet Transform. This technique is found to be consists of more fidelity and robustness. The
original color cover image is converted from RGB color space to YCbCr. Y stands for luminance,
Cb and Cr stands for chrominance. The embedding process involves following steps. Input the
original color cover image of RGB color space. Convert it to YCbCr color space. Apply 2 level DT-
CWT to each component of Y, Cb and Cr. Apply SVD Singular value Decomposition to each high
pass sub band. Now input the gray scale watermark image. Apply 1 level DT-CWT to it. Now apply
SVD to each high pass sub band. Now modify the singular values of both DT-CWT applied sub
band of original and watermark image respectively along scaling factor. Apply inverse DT-CWT to
modified components. The modified components are Y^, Cb^ and Cb^ are then converted back to
RGB color space and hence we receive watermarked image. The extraction process is the reverse of
embedding process. For extraction, there is no need of original image. The steps are as follows. The
watermarked image is changed to YCbCr from RGB. SVD is applied to high pass sub band
individually. Extract all the SVD values. Apply DT-CWT to the coefficients which are applied by
SVD. Apply inverse DT-CWT to coefficients. Reconstruct the watermark. By inserting watermark
into Y component avoids Gaussian noise, JPEG compression attack as well as rotation attacks.
Similarly embedding in Cb avoids the blurring and cropping. Again in Cr embedding, avoids the
Formulating Hypothesis:
For embedding we have different techniques.
1: Spatial Domain
2: Transform domain
Spatial Domain
It is used for smoothing of edges, increasing the sharpness and highlighting the areas of intensity
alteration. It is good for detecting cropping and translation but not for compression and noise
detection. It has further approaches which are as follows.
(a) Least significant bit
(b) Patch work
(a) Least significant bit
In this the watermark is embedded into the least significant bits of randomly chosen pixels of an
image. Its advantage is that it is very easy and simple to implement. Its disadvantage is that it is not
robust to attacks and watermark is easily destroyed by removing the least significant bits.
(b) Patch work
In this technique, patch work chooses casual pixels of image group wise and then increases the
brightness of one pixel and decreasing the brightness of another pixel correspondingly. This
technique is only applied to images of high texture and not applied to texts.
Transform domain
In transform domain, the watermark is embedded into the coefficients of content rather than pixels.
The most common transform domains are as under.
(a) Discrete Wavelet Transform
(b) Discrete Cosine Transform
(c) Singular Value Decomposition
Discrete Wavelet Transform
DWT is applied to image up to number of levels accordingly. At first level it is used to decompose
the image into four non overriding multi resolution sub bands that are LL “approximation sub band”,
HL “Horizontal sub band”, LH ”Vertical sub band” and HH “diagonal sub band”. The first alphabet
defines the high or low frequency operation on rows and second letter defines for columns. The LL
level defines the coarse scale coefficient whereas the HL, HL and HH level defines the finest scale.
The LL sub band consists of most of signal energy therefore embedding here can distort image
quality. So robustness and imperceptibility can be achieved when watermark to be embedded into
high frequency sub band that is LH, HL and HH.
Discrete Cosine Transform
Discrete Cosine transform (DCT) is used to decompose the image into blocks and then DCT is
applied to these blocks that leads to three frequency sub bands that is high, low and moderate. DCT
has energy compaction which leads to the benefit of transforming only few coefficients instead full
set of pixels. DCT is also beneficial in image compression where each block of it does not provide
information which is important to understand image.
c) Singular Value Decomposition:
Singular Value Decomposition (SVD) is being used in digital image processing applications. In
linear algebra an image is considered as matrix which is regarded as an array of nonnegative scalar
values. Here an image is divided into three matrices which are of same size as original matrix. The
two matrices namely U and V are called orthogonal matrices and the third matrix namely S is called
diagonal matrix. SVD contains two properties. The first property claims that it contains built in
algebraic properties. Second one claims that it is not affected by any attack if watermark is being
embedded into singular values of diagonal matrix S.
Proposed Hypothesis:
Our proposed technique for digital watermarking is the fusion of DWT and SVD along with
permutation algorithm. DWT is used for to provide imperceptibility as well as robustness while SVD
is used to provide scalability and robustness too. Permutation algorithm is used for security
purpose.Watermark is run through the permutation algorithm so even when if the extraction
algorithm could be known to intruder, it would be difficult to retrieve the watermark .We have used
HAAR wavelet transform because it is easy, simple and efficient.
Collection of data:
The valuable compendium of useful information regarding our proposed research is taken from
research papers, documents, books and internet.
Data Analysis:
We use transform domain because in spatial domain watermark is embedded into the least
significant bits of randomly chosen pixels of an image.It is not robust to attacks and watermark is
easily destroyed by removing the least significant bit.We use Transform domain because it provides
robustness and Scalability against various attacks.
Interpret and Report:
We introduced color image watermarking for the purpose of ownership identification and copyright
protection. We have used the color image of ducks as cover image and gray scale logo of Shaheed
Benazir Bhutto Women University as a watermark to be embedded. Both cover and watermark
images are of PNG extension. This extension is used due to reason that it uses lossless image
compression technique because whenever data is stored and retrieved for further processing, data is
not lost. During experiments different measures were used for examining the outcomes. This leads to
that approach which gives good robustness, imperceptibility and security.