You are on page 1of 11

Assignment No 3

Research Process

Submitted to:Sir Wajid ullah Khan


Submitted by:Zahra Banoori
Date of Submission:9th April,2021
Digital Watermarking
Research Process
Problem statement Literature Review Suggested Hypothesis Data Collection
(i) Spatial Domain Color Image:Professional camera
Techniques (a) Least Significant bit
Water Mark   (b) Patch Work  man Arshad Ali(National
DWT Geographic Channel)
digital content (ii) Transform Domain
(a) DWT Different Research Papers
DCT (b) SVD
(c) DCT Books
SVD (iii) Permutation algoritham
(iv) Haar Wavelet transform

Data Analysis Interpret and Report


Used
Transform Gray scale water mark is
domain instead of embedded in colorful
 image
Spatial domain in 
order to get
robustness and
scalability
Digital Watermark:

Digital watermark is defined as the image, audio, sequence of characters, or any data inserted into

signal which tolerates noise. Again, it is used to provide copyright prevention, security and

authentication of owner. The difference between traditional watermark and digital watermark is that

digital watermark is not visible under light or darkness until or unless passed through some

algorithm.

Problem Statement:
Because of the huge use of internet digital materials are accessible to everyone. They use them,

distribute them illegally and claim that these belong to them without the permission of owner. In

order to resolve this case, we introduce the technique to watermark digital content.

Literature Review:
DWT Technique:
The major objectives of the research is robustness and imperceptibility. DWT is selected because in

this according to HVS human visual system, every channel is processed independently. Every

channel has its own bandwidth. Here when the image to be selected as original image is passed by

DWT where an image is decomposed into four sub bands. As lower frequency sub band contains lot

of information about image and the high frequency sub band contains information about textures and

edges. More energy is compact in low frequency sub band where image can be easily distorted but

provides good robustness. Gray scale watermark is embedded into the middle sub band LH and HL

therefore. And hence HL is less sensitive to HVS so therefore this sub band is selected for

embedding. This scheme is robust against Gaussian noise and salt and pepper. The technique which

is used in this paper is to provide robustness without affecting the image quality of cover image as

well as to provide high security plus watermark should be having high capacity.

DCT Based Technique :

R.Eswaraiah and E.Sreenivasa Reddy” proposed the hybrid scheme of Discrete Wavelet Transform

(DWT) and Discrete Cosine Transform for digital watermarking technique. The major objectives of
the proposed scheme are to obtain imperceptibility and robustness. The cover image is of RGB color

space. The watermark is of gray scale. The color cover image is split into three color channels. The

blue channel is selected for embedding watermark because it is resistant to changes. The color cover

image is passed through DWT up to 2 levels to decompose the image into LL, HL, LH and HH sub

bands. The HL2 sub band is selected for embedding watermark. The HL2 sub band is divided into

size of 8*8 four blocks. DCT is applied to each block. The watermark image is inputted and DCT is

also applied to watermark image. The DCT coefficients of watermark are embedded into DCT

blocks of HL2 sub band. IDCT and IDWT are applied and all the three channels are recombine with

the extracted one and hence watermarked image is obtained. For extraction, the three channels are

splinted and DWT up to 2 levels are applied. DCT is applied and watermark embedded into DCT

blocks of HL2 sub band is extracted. For measuring the quality of watermarked image the PSNR

“Peak Signal to Noise Ratio” is computed as well as for the measurement of quality of watermark

image the NC Normalized Coefficient is computed. This scheme is robust against Gaussian Noise,

Salt and Pepper, Poisson attack, Gaussian blur, JPEG compression, sharpening and cropping.
Discrete Cosine Transform and Singular Value Decomposition. The cover image is of RGB color

space of size 512*512. The watermark is of gray scale. The objectives of their proposed work are

robustness and capacity. This proposed methodology is 90% robust to attacks except the rotation

attack

SVD

Samira Mabtoul El Hassan Ibn Elhaj and Driss Aboutajdine” proposed the scheme of newly based

transform domain called Dual Tree Complex Wavelet which is found to be better than Discrete

Wavelet Transform. This technique is found to be consists of more fidelity and robustness. The

original color cover image is converted from RGB color space to YCbCr. Y stands for luminance,

Cb and Cr stands for chrominance. The embedding process involves following steps. Input the

original color cover image of RGB color space. Convert it to YCbCr color space. Apply 2 level DT-

CWT to each component of Y, Cb and Cr. Apply SVD Singular value Decomposition to each high

pass sub band. Now input the gray scale watermark image. Apply 1 level DT-CWT to it. Now apply

SVD to each high pass sub band. Now modify the singular values of both DT-CWT applied sub
band of original and watermark image respectively along scaling factor. Apply inverse DT-CWT to

modified components. The modified components are Y^, Cb^ and Cb^ are then converted back to

RGB color space and hence we receive watermarked image. The extraction process is the reverse of

embedding process. For extraction, there is no need of original image. The steps are as follows. The

watermarked image is changed to YCbCr from RGB. SVD is applied to high pass sub band

individually. Extract all the SVD values. Apply DT-CWT to the coefficients which are applied by

SVD. Apply inverse DT-CWT to coefficients. Reconstruct the watermark. By inserting watermark

into Y component avoids Gaussian noise, JPEG compression attack as well as rotation attacks.

Similarly embedding in Cb avoids the blurring and cropping. Again in Cr embedding, avoids the

rescal and gamma correction.

Formulating Hypothesis:
For embedding we have different techniques.
1: Spatial Domain
2: Transform domain
Spatial Domain
It is used for smoothing of edges, increasing the sharpness and highlighting the areas of intensity
alteration. It is good for detecting cropping and translation but not for compression and noise
detection. It has further approaches which are as follows.
(a) Least significant bit
(b) Patch work
(a) Least significant bit
In this the watermark is embedded into the least significant bits of randomly chosen pixels of an
image. Its advantage is that it is very easy and simple to implement. Its disadvantage is that it is not
robust to attacks and watermark is easily destroyed by removing the least significant bits.
(b) Patch work
In this technique, patch work chooses casual pixels of image group wise and then increases the
brightness of one pixel and decreasing the brightness of another pixel correspondingly. This
technique is only applied to images of high texture and not applied to texts.
Transform domain
In transform domain, the watermark is embedded into the coefficients of content rather than pixels.
The most common transform domains are as under.
(a) Discrete Wavelet Transform
(b) Discrete Cosine Transform
(c) Singular Value Decomposition
Discrete Wavelet Transform
DWT is applied to image up to number of levels accordingly. At first level it is used to decompose
the image into four non overriding multi resolution sub bands that are LL “approximation sub band”,
HL “Horizontal sub band”, LH ”Vertical sub band” and HH “diagonal sub band”. The first alphabet
defines the high or low frequency operation on rows and second letter defines for columns. The LL
level defines the coarse scale coefficient whereas the HL, HL and HH level defines the finest scale.
The LL sub band consists of most of signal energy therefore embedding here can distort image
quality. So robustness and imperceptibility can be achieved when watermark to be embedded into
high frequency sub band that is LH, HL and HH.
Discrete Cosine Transform
Discrete Cosine transform (DCT) is used to decompose the image into blocks and then DCT is
applied to these blocks that leads to three frequency sub bands that is high, low and moderate. DCT
has energy compaction which leads to the benefit of transforming only few coefficients instead full
set of pixels. DCT is also beneficial in image compression where each block of it does not provide
information which is important to understand image.
c) Singular Value Decomposition:

Singular Value Decomposition (SVD) is being used in digital image processing applications. In
linear algebra an image is considered as matrix which is regarded as an array of nonnegative scalar
values. Here an image is divided into three matrices which are of same size as original matrix. The
two matrices namely U and V are called orthogonal matrices and the third matrix namely S is called
diagonal matrix. SVD contains two properties. The first property claims that it contains built in
algebraic properties. Second one claims that it is not affected by any attack if watermark is being
embedded into singular values of diagonal matrix S.
Proposed Hypothesis:
Our proposed technique for digital watermarking is the fusion of DWT and SVD along with
permutation algorithm. DWT is used for to provide imperceptibility as well as robustness while SVD
is used to provide scalability and robustness too. Permutation algorithm is used for security
purpose.Watermark is run through the permutation algorithm so even when if the extraction
algorithm could be known to intruder, it would be difficult to retrieve the watermark .We have used
HAAR wavelet transform because it is easy, simple and efficient.
Collection of data:
The valuable compendium of useful information regarding our proposed research is taken from
research papers, documents, books and internet.
Data Analysis:

We use transform domain because in spatial domain watermark is embedded into the least
significant bits of randomly chosen pixels of an image.It is not robust to attacks and watermark is
easily destroyed by removing the least significant bit.We use Transform domain because it provides
robustness and Scalability against various attacks.
Interpret and Report:

We introduced color image watermarking for the purpose of ownership identification and copyright
protection. We have used the color image of ducks as cover image and gray scale logo of Shaheed
Benazir Bhutto Women University as a watermark to be embedded. Both cover and watermark
images are of PNG extension. This extension is used due to reason that it uses lossless image
compression technique because whenever data is stored and retrieved for further processing, data is
not lost. During experiments different measures were used for examining the outcomes. This leads to
that approach which gives good robustness, imperceptibility and security.

You might also like