Professional Documents
Culture Documents
The proposed method consists of a technique to provide the authenticity of the information,
copyright information by means of watermarking. In this method, whatever information being
embedded is an image. Initially one watermark (which is in the form of image) is embedded into
another watermark (which is again image). This process of embed- ding first watermark into
second watermark is called as nesting. Once the nesting of watermark is created, this nested
watermark is embedded into the main image or cover image. Before the nested watermark is
embedded into the main image, it is encrypted. Hence the main reason to encrypt the watermark
before embedding is, whatever information has been embedded into the main image, should not
be manipulated by the attackers
First, one watermark is embedded into another watermark. Here both watermarks are images.
Second, the resultant watermark is embedded into the main image. In watermark extraction
process, from the watermarked image (which is a main image after embedding the nested
watermark), nested watermark (one watermark within another watermark) is extracted. The
nested watermark being extracted from the main image or watermarked image is called as
watermarked2. From watermarked2 which is a nested watermark, initial embedded watermark
which is also called as water- mark1 is extracted. The main purpose of extraction is, whatever
information is embedded could be obtained.
Fig. 1. Block diagram of watermark embedding process.
Fig. 1 shows how watermark can be embedded into the image. Pseudo-code for watermark
embedding
• Take each bit • Whatever bits are extracted are embedded into the LSB ‟s of cover_Image
pixel ‟s green and blue component
• Finish
• End of Function
Fig. 2. Block diagram of watermark extraction process.
Fig. 2 shows how the watermark can be extracted from the image. Pseudo-code for watermark
extraction • Function Watermark_Extract(watermarked_Image) • Input watermarked_Image •
For each 2 pixels in watermarked_Image • Initially first pixel ‟s two LSB ‟s of Green and Blue
Component is being extracted • After extracting the first pixel ‟s Green and Blue component ‟s
LSBs, next pixel ‟s two LSB ‟s of Green and Blue component is extracted • Group together the
obtained pixels which will form a byte • Save the byte inside array which is called as
LSB_Byte_Array • Finish
Take a group of four bytes of LSB_Byte_Array • Create the pixel by making use of next four
bytes of LSB_Byte_Array • Put the obtained pixel into the RGB_Array • Finish • Finally,
whichever image is obtained that has to be written into an- other file with the help of
RGB_Array • End the Function
In the proposed system, java is used to implement the watermarking algorithm. The main reason
for using the nested watermark is, large amount of information could be embedded into the main
image. Due to the process of nesting, large amount of data could be embedded. The main benefit
of encrypting the nested watermark before embedding into the main image is, if the attackers try
to manipulate the embedded data, they cannot do so since a key will be used for the encryption
process. Hence due to the encryption concept, security of the embedded data is increased. Once
the bits of watermark are extracted, they have been put into main image’s two LSBs of green as
well as blue component. Hence orig- inal image and watermarked image’s histograms are almost
similar.