You are on page 1of 4

Nested watermarking methodology.

The proposed method consists of a technique to provide the authenticity of the information,
copyright information by means of watermarking. In this method, whatever information being
embedded is an image. Initially one watermark (which is in the form of image) is embedded into
another watermark (which is again image). This process of embed- ding first watermark into
second watermark is called as nesting. Once the nesting of watermark is created, this nested
watermark is embedded into the main image or cover image. Before the nested watermark is
embedded into the main image, it is encrypted. Hence the main reason to encrypt the watermark
before embedding is, whatever information has been embedded into the main image, should not
be manipulated by the attackers

Watermarking method (modified least significant bit)


The watermarking method consists of two processes. First one is watermark embedding process
and second one is watermark extraction process. In watermark embedding process, watermark is
embedded into the image. Here, the watermark we are going to embed is an image. Initially
embedding of one watermark into another watermark is done. This creates a nesting. Then the
embedding of resultant watermark into the main image is done. In embedding process, the pixels
of the image (watermark) which we are going to embed is extracted, and then inserted into the
two LSBs of main image ‟s Green and Blue components. Hence in the proposed method, two
times embedding process is done.

First, one watermark is embedded into another watermark. Here both watermarks are images.
Second, the resultant watermark is embedded into the main image. In watermark extraction
process, from the watermarked image (which is a main image after embedding the nested
watermark), nested watermark (one watermark within another watermark) is extracted. The
nested watermark being extracted from the main image or watermarked image is called as
watermarked2. From watermarked2 which is a nested watermark, initial embedded watermark
which is also called as water- mark1 is extracted. The main purpose of extraction is, whatever
information is embedded could be obtained.
Fig. 1. Block diagram of watermark embedding process.

Fig. 1 shows how watermark can be embedded into the image. Pseudo-code for watermark
embedding

• Function Watermark_Embedding(cover_Image, sub_Image)

• Input the cover_Image Initialize the variables i and j to 0

• Input the sub_Image • For each sub_Image „s pixel, say (x, y)

• For each sub_Image pixel ‟s bit

• Take each bit • Whatever bits are extracted are embedded into the LSB ‟s of cover_Image
pixel ‟s green and blue component

• Start with i, j • i, j has to be incremented accordingly

• x, y has to be incremented accordingly

• Finish

• Final cover_Image has been written into another file

• End of Function
Fig. 2. Block diagram of watermark extraction process.

Fig. 2 shows how the watermark can be extracted from the image. Pseudo-code for watermark
extraction • Function Watermark_Extract(watermarked_Image) • Input watermarked_Image •
For each 2 pixels in watermarked_Image • Initially first pixel ‟s two LSB ‟s of Green and Blue
Component is being extracted • After extracting the first pixel ‟s Green and Blue component ‟s
LSBs, next pixel ‟s two LSB ‟s of Green and Blue component is extracted • Group together the
obtained pixels which will form a byte • Save the byte inside array which is called as
LSB_Byte_Array • Finish

Take a group of four bytes of LSB_Byte_Array • Create the pixel by making use of next four
bytes of LSB_Byte_Array • Put the obtained pixel into the RGB_Array • Finish • Finally,
whichever image is obtained that has to be written into an- other file with the help of
RGB_Array • End the Function

 A5/1 encryption method


A5/1 is the encryption method used to encrypt the nested watermark obtained before embedding
into the main image or cover image.

Fig. 3 shows the A5/1 encryption algorithm.


1. Take 3 Left Shift Register which are of binary stream type. The total length should be
equal to 64 bits.
2. Registers should be filled with initial seed value.
3. These register’s first bits are used for doing XOR operation and result is stored in the
result bit.
4. Only those registers bits whose clock bits are same as the majority bits will be shifted to
the left.
5. The above steps are continued until the formation of one byte. The obtained byte is a key.

Fig. 4 shows the process of embedding encrypted watermark.

Result and discussion

In the proposed system, java is used to implement the watermarking algorithm. The main reason
for using the nested watermark is, large amount of information could be embedded into the main
image. Due to the process of nesting, large amount of data could be embedded. The main benefit
of encrypting the nested watermark before embedding into the main image is, if the attackers try
to manipulate the embedded data, they cannot do so since a key will be used for the encryption
process. Hence due to the encryption concept, security of the embedded data is increased. Once
the bits of watermark are extracted, they have been put into main image’s two LSBs of green as
well as blue component. Hence orig- inal image and watermarked image’s histograms are almost
similar.

You might also like