You are on page 1of 11

DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN

TESTING

CHAPTER-6 TESTING
Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test.[1] Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Test techniques include, but are not limited to, the process of executing a program or application with the intent of finding software bugs (errors or other defects). Software testing can be stated as the process of validating and verifying that a software program/application/product: 1. 2. 3. meets the requirements that guided its design and development; works as expected; and can be implemented with the same characteristics.

Software testing, depending on the testing method employed, can be implemented at any time in the development process. However, most of the test effort occurs after the requirements have been defined and the coding process has been completed[1]. As such, the methodology of the test is governed by the software development methodology adopted.

6.1SOFTWARE TESTING LIFECYCLE:
CONSISTS OF SIX (GENERIC) PHASES:       Test Planning Test Analysis Test Design Construction and verification Testing cycles Final Testing and Implementation

6.1.1 TEST PLANNING:
This the phase where Project manager has to decide what changes need to be tested, do the project have the appropriate budget etc. Naturally, proper planning at this stage would greatly reduce the risk of low quality software. This planning will be an ongoing process with no endpoints.
Dept Of Computer Science & Engineering, NIT Agartala

Stress and Performance testing plans needs to be completed.3 TEST DESIGN: Test Plans and Cases which were developed in the analysis phase are revised. test cases.1. 6. The Software Test Plan (STP) is design to prescribe the scope.4 CONSTRUCTION AND VERIFICATION: In this phase we have to complete all the test plans. Acceptance. In this stage risk assessment criteria is developed. approach. Functional validation matrix is also revised and finalized. the testing process is evaluated and lessons learnt from that testing process are documented. NIT Agartala .1.1. complete the scripting of the automated test cases . next step is to delve little more into the project and decide what types of testing should be carried out at different stages of the project. Retesting (test cycle 2. 6. resources and schedule of all testing activities. 6. Dept Of Computer Science & Engineering. Run test cases-> Report Bugs -> revise test case (if needed) -> add new test case (if needed) -> bug fixing ->.5 TESTING CYCLES: In this phase we have to complete testing cycles until test cases are executed without errors or a predefined condition is reached.1. provide and complete different matrices for testing.2 Post Implementation: In this phase.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING 6. load and recovery testing will also be conducted and the application needs to be verified under production conditions[2][1]. test cycle 3……).6 FINAL TESTING AND IMPLEMENTATION: In this we have to execute remaining stress and performance test case.2 TEST ANALYSIS: Once test plan is made and decided upon.1. 6. documentation for testing is completed/updated. 6.

2 TEST CASE -EMBEDDING PROCEDUREAction performed Input Host image Action On logo image Input logo image greater in dimension w.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING 6.t host image Action Performed The large sized logo file is fed into software for embedding Invalid output Showing Invalid outputs Required Output Error message: Choose proper image size. go to welcome screen Remarks The desired output found so test successful 6.3 TEST CASES 6.1. go to welcome screen Remarks The desired output found so test successful Dept Of Computer Science & Engineering. NIT Agartala .txt file is fed into software for embedding Invalid output Showing Invalid outputs Required Output Error message: Invalid input.1 TEST CASE-EMBEDDING PROCEDURE Action performed Input Host image Action On logo image Input any other file except image files Action Performed The .3.r.3.1.

2.3. go to welcome screen The desired output found so test successful Dept Of Computer Science & Engineering. go to welcome screen The desired output found so test successful 6.2 TEST CASE.1 TEST CASE.3.EXTRACTION PROCEDURE Action performed Action On nonwatermarked image The non watermarked image is fed into software for extraction Invalid output Required Output Remarks Input Nonwatermarked image Showing Invalid outputs Error message: Choose watermarked image.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING 6. NIT Agartala .EXTRACTION PROCEDURE Action performed Action On nonwatermarked image The non watermarked image is fed into software for extraction Invalid output Required Output Remarks Input Nonwatermarked image Showing Invalid outputs Error message: Choose watermarked image.2.

1. NIT Agartala .Several tests are used in this regard 6.1. The performance of any watermarking project is measured by three (4) following parameter as mentioned below: 6. examining tests on the resulted watermarked image.1 Mean Squared Error Mean Squared Error (MSE) is one of the earliest tests that were performed to test if two pictures are similar.4 PERFORMANCE ANALYSIS Several Functions are used to qualify the watermarking algorithm. Dept Of Computer Science & Engineering.1 Impercebtibility The imperceptibility of the watermark is tested through comparing the watermarked image with the original one.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING 6. Equation (4) describes how this value is obtained.4. 6.4. A function could be simply written according to equation(3).4.2 PSNR Pick Signal to Noise Ratio (PSNR) is a better test since it takes the signal strength into consideration (not only the error).

So.1 Compression Attack The most used image compression is definitely JPEG.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING Fig: showing PSNR and MSE value for attacked and non-attacked images 6. They are designed to resist any manipulations that may be encountered.4. unintentional (cropping. All applications where security is the main issue use. NIT Agartala .2. 6. for compressing an image to different quality factors. The robustness of a watermark method can be evaluated by performing attacks on the watermarked image and evaluating the similarity of the extracted message to the original one. In MATLAB. compression. the embedded watermark should be such that it is invariant to various such attacks. There are various attacks. scaling) and unintentional attacks which are aimed at destroying the watermark.4.2 ROBUSTNESS This is by far the most important requirement of a watermark. the image should be created from a matrix and be reread: Dept Of Computer Science & Engineering.

2.4.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING Fig: Original watermarked image at 60% JPEG Compression Fig: Extracted Logo 6. NIT Agartala .2 Noise Attack Action performed Action On Watermarked image Attack with different kinds of noise and remove with specific filter Action on Output Invalid output Required Output Remarks Input Watermarked image The noise attacked watermarked image is fed into software for extraction The logo image is highly distorted The logo image can be recovered without severe distortion The desired output found so test successful Dept Of Computer Science & Engineering.

1 Noise_attack_ salt and pepper noise Fig: Original Image Fig: Logo Image Fig: Watermarked_Image Fig: Attacked_watermarkimage Fig: Recovered_logo Dept Of Computer Science & Engineering. NIT Agartala .DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING TEST CASE: 6.42.2.

4.2 NOISE_ATTACK_ POISSON NOISE Fig: Recovered Logo TEST CASE: 6. NIT Agartala .2.2.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING TEST CASE: 6.2.4.3 NOISE_ATTACK_ SPECKLE NOISE Fig: Recovered Logo after treated with noise Dept Of Computer Science & Engineering.2.

4 NOISE_ATTACK_ GAUSSIAN NOISE Fig: Recovered logo after treated with noise HISTOGRAM ANALYSIS Dept Of Computer Science & Engineering.4.2. NIT Agartala .2.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING TEST CASE: 6.

Any watermarking method is not capable of holding more than a certain length of message or it will endanger its imperceptibility. The capacity of the watermark method can be easily tested by increasing the length of the watermarking message. If the algorithm is non-blind.4.3 CAPACITY . it is better to bring back those parts from the original image for a better recovery of the message. NIT Agartala . 6.2.4.3 Cropping Attack Cropping attack is simply cutting off parts of the image. Dept Of Computer Science & Engineering.DIGITAL WATERMARKING IN SPATIAL AND FREQUENCY DOMAIN TESTING 6.