Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

Similar documents
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Image Steganography (cont.)

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Digital Image Steganography Techniques: Case Study. Karnataka, India.

STEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES

A Framework of Hyperspectral Image Compression using Neural Networks

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

A New Approach to Compressed Image Steganography Using Wavelet Transform

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Image Compression: An Artificial Neural Network Approach

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Robust DWT Based Technique for Digital Watermarking

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Digital Watermarking with Copyright Authentication for Image Communication

A Novel Information Security Scheme using Cryptic Steganography

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Efficient Image Steganography Using Integer Wavelet Transform

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Data Hiding in Video

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Reversible Data Hiding VIA Optimal Code for Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

A new robust watermarking scheme based on PDE decomposition *

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

Watermarking Moble Phone Color Images With Error Correction Codes

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Efficient & Secure Data Hiding Using Secret Reference Matrix

Random Image Embedded in Videos using LSB Insertion Algorithm

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

International Journal of Computer Engineering and Applications,

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

REVIEW ON IMAGE COMPRESSION TECHNIQUES AND ADVANTAGES OF IMAGE COMPRESSION

2

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Copyright Detection System for Videos Using TIRI-DCT Algorithm

Improved Qualitative Color Image Steganography Based on DWT

A Secure Steganography Technique using DCT and Modified RC4

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Information and Communications Security: Encryption and Information Hiding

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation

Enhancing the Image Compression Rate Using Steganography

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

QR Code Watermarking Algorithm based on Wavelet Transform

Image Authentication and Recovery Scheme Based on Watermarking Technique

A Robust Watermarking Algorithm For JPEG Images

An Improved Performance of Watermarking In DWT Domain Using SVD

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Information Cloaking Technique with Tree Based Similarity

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Combined Hashing/Watermarking Method for Image Authentication

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Data Hiding on Text Using Big-5 Code

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Formula Diamond Encoding Data Hiding Scheme

A SECURE STEGANOGRAPHY APPROACH OF MULTIPLE SECRET IMAGES USING ANN

WATERMARKING FOR LIGHT FIELD RENDERING 1

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Dr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq

Multimedia Security: So What s the Big Deal?

Steganography using MATLAB

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Implementation of Random Byte Hiding algorithm in Video Steganography

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

DWT-SVD Based Digital Image Watermarking Using GA

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Implementation of ContourLet Transform For Copyright Protection of Color Images

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Supervised Learning in Neural Networks (Part 2)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

A New hybrid method in watermarking using DCT and AES

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

A NOVEL METHOD FOR HIDING INFORMATION

Transcription:

International Journal of Scientific Research and Management (IJSRM) Volume 5 Issue 06 Pages 5378-5385 2017 Website: www.ijsrm.in ISSN (e): 2321-3418 Index Copernicus value (2015): 57.47 DOI: 10.18535/ijsrm/v5i6.04 Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2 1 Department of Computer Science, University of Delhi New Delhi Rashmeet.mcs.du.2014@gmail.com 2 Department of Computer Science, University of Delhi New Delhi skmuttoo@cs.du.ac.in Abstract: Digital Watermarking is the act of hiding a message related to an image within the image itself. Watermarking has many desirable properties like effectiveness, image fidelity and robustness. Multilayer artificial neural network is used to achieve image compression. The input pixels are used as target values and the hidden layer output is the compressed image. Our proposed technique uses an image as the vessel data and embeds secret information in the noise-like region of the bit-planes and watermark in the informative region of the bit-planes of the vessel image without deteriorating image quality. The secret image is first compressed by artificial neural network and then embedded in the vessel image. This technique makes use of the characteristics of the human vision system where a human eye cannot perceive any change in the information in a very complicated binary pattern. Keywords:- Watermarking, Multilayer neural network, image compression, Vessel image. 1. INTRODUCTION A digital watermark is visible information in the form of a text or image that has been added to the original image. Watermarking is the process that embeds data called watermark into a multimedia object. Some of its important applications include digital copyrights management and protection. [2] Image compression has been an active area of research since the inception of digital image processing. Compression is achieved by exploiting the redundancy in an image. Artificial Neural Network have found increasing applications in this field due to their noise suppression and learning capabilities. [1] In this paper we have proposed a technique for watermarking using bit plane complexity segmentation and artificial neural network. Some of the concepts used are as follows:- 1.1 Back Propagation Neural Network An Artificial Neural Network (ANN) is a computational model based on the structure and functions of biological neural networks. Back Propagation Neural Network is designed and trained using different learning algorithms. [4] layer. Both of input layer and output layer are fully connected to hidden layer. [3] Figure 1 The connection weights in the network are gradually adjusted, working backwards from the output layer, to the input layer through the hidden layer, until correct output is produced. The general parameters deciding the performance of back propagation neural network algorithm includes mode of learning, target values, goal, epochs, learning rate and momentum factors. [3] Compression is achieved by designing the value of the number of neurons at the hidden layer, less than that of neurons at both input and output layers. [3] The neural network structure shown in Figure1 has three layers: one input layer, one output layer and one hidden 1.1.1 Network Training Algorithms Training the network is an important step to get the optimal values of weights and biases after being initialized randomly Rashmeet Kaur Chawla, IJSRM Volume 5 Issue 06 June 2017 [www.ijsrm.in] Page 5378

or with certain values. For training the network, the 128x128 pixels image has been employed. During training, the weights and biases of the network are iteratively adjusted to minimize the network performance function which is the mean square error for the feed forward networks. [1] Training could be started by making target matrix equal to input matrix. Different training algorithms can be used, mainly classified as fast algorithms(example trainbfg, trainoss, trainlm, etc.) and slow algorithms (example traingd, traingda, etc.) 1.1.2 Simulation of Results After training, we obtain a simulated network by the input matrix and the target matrix. In the simulation process two outputs are obtained, the hidden layer output and the output layer output. The hidden layer produces a matrix of 16x256, whereas the output layer produces a matrix of 64x256. [3] Hidden layer output is the compressed image and the output layer matrix is the reconstructed image. In the hidden layer matrix, each column should be reshaped into 4x4 pixel blocks, while in the output layer matrix, each column should be reshaped into 8x8 pixel blocks to display both matrices as images. [1] 1.2 Watermarking A watermark is data which consists of an identifying image or pattern. The watermark may not contain a relation to the multimedia object in which it is embedded. Watermarking is the process water mark in a cover. Digital watermarks are used to verify the authenticity or integrity of the object or to show the identity of its owners. They are said to be robust if it resists a designated class of transformations. [5]. Watermarking is done in spatial domain and transform domain. Discrete Cosine Transform (DCT) is one of the transforms used for watermarking. We have used DCT in our proposed technique. 1.2.1 HASHING A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values or hash codes. The input (message, file etc.) is viewed as a sequence of n- bit blocks. The input is processed one block at a time in an iterative fashion to produce a 1-block hash function. [6] 1.2.2 ENCRYPTION It is a process of scrambling the data to prevent third party from understanding the content. It also protects the content of the message in such a way that only authorized parties can read it. We have used RSA (Rivest-Shamir-Adleman) algorithm in our proposed technique. 1.3 Bit Plane Complexity Segmentation Technique: The following are the steps used in the proposed technique: Canonical Grey Code In BPC the substantial portions of the regions on the higher bit planes are relatively flat in color (mostly all 0s or all 1s). This is because of the Hamming Cliffs which occur with PBC wherein a small change in color affects many bits of the color value. In binary: 127 = 01111111 & 128 = 10000000 In gray code: 127 = 01000000 & 128 = 11000000 In gray code the representation of adjacent gray levels will differ only in one bit (unlike binary format where all the bits can change). CGC images do not suffer from such Hamming Cliffs. Complexity of an image The complexity of an image (α) is defined by the following:- α =k/the maximum possible B-W changes in the image, where, k is the total length of black-and-white border in the image. So, value of α ranges over 0 α 1. Conjugation of a binary image:- It is applied when the complexity of the vessel image block is less than the threshold and cannot be used for embedding the secret data. P * = P XOR W c, where P* is a conjugated 8x8 block of vessel image, P is an informative (i.e. less complex) 8X8 block of vessel image, W c is a complex binary pattern. After conjugation, complexity of the block of vessel image increases and thus can be used for embedding secret data. Α(P*) = 1 α(p). [6] 2. PROPOSED TECHNIQUE:- Watermarking technique prevents unauthorised embedding as it solves the problem of authenticating the sender by either encrypting the message using asymmetric key cryptography or appending a cryptographic signature. Even if the adversary knows the embedding algorithm and watermark, the message cannot be encrypted correctly or a valid signature be created unless they know the encryption key. With this proposed technique, we can also hide a larger size secret image into vessel image after compressing it using artificial neural network. This is extremely important for efficient storage and transmission of image data. Page5379

In [5] the watermarking technique, in [1] the Image compression technique and in [6] the BPCS technique is described. The proposed technique is described in algorithm 1, 2 and 3. Algorithm 1 for obtaining the cryptographic signature using the watermark:- 1. Construct a description of cover work based on lowest frequency components of vessel image. (Using dct) 2. Compute a one way hash of the watermark message concatenated with the description of cover work. 3. Encrypt the hash with a private key using RSA algorithm, thus obtaining a cryptographic signature. 4. Embed the watermark message along with the signature using Bit Plane Complexity Segmentation (BPCS) technique in the informative regions of the vessel image. Algorithm 2 for the Image Compression:- 1. Take a 128x128 grey scale secret image. Divide it into 8x8 pixel blocks and reshape each one into 64x1 column vector. 5. Embed watermark along with the signature into the informative regions of the bit-planes. 6. Divide the secret file into a series of 8 X 8 secret blocks. 7. If a block (P) is less complex than the threshold (α0), then conjugate it to make it a more complex block (P*). (Provided it is not used for embedding the watermark or the signature) 8. If the block is conjugated, then record this fact in a conjugation map. Embed the conjugation map in the noise block with the highest entropy. 9. Embed each secret block into the noise-like regions of the bit-planes (or replace all the noise-like regions with a series of secret blocks). 10. Generate a new stego image using modified bit planes. 11. Convert the stego image from CGC back to PBC. 3. EXPERIMENTAL RESULTS:- 2. Arrange the column vectors into a matrix of 64x256, which will be used as input matrix. 3. Let the target matrix equal to the input matrix obtained in step 2. 4. Choose a suitable learning algorithm such as traincgf and parameters like goal 0.001 to start training the neural network using neural network toolbox of matlab. 5. Train and simulate the network with the given input matrix and the target matrix. 6. Obtain the output matrices of the hidden layer and the output layer. 7. Post-process them to obtain the compressed image and the reconstructed image respectively. Algorithm 3 for the BPCS technique :- Fig 1.1- a), b), c) represent original vessel image, watermark image, secret data respectively. 1. Transform the vessel image from PBC to CGC system. 2. Divide our vessel image into a series of bit planes (1-8). 3. Segment each bit-plane of the vessel image into informative and noise-like regions by using a threshold value (α0=0.3). 4. Divide the watermark into a series of 8 X 8 blocks. Page5380

Fig 1.4 shows how a 64 x 64 watermark image is divided into 64(8 x 8) blocks. Fig 1.2 shows the compressed secret image. Fig 1.5 a), b) shows the original vessel image and vessel image obtained after embedding watermark and compressed secret file in CGC system. Fig 1.3 shows the bit plane slicing of the vessel image. Fig 1.6 a), b) shows the Original vessel image and vessel image which is obtained after embedding the watermark and the secret file. Page5381

4. ANALYSIS The following table shows PSNR values between original vessel images and vessel images obtained after embedding watermark and the secret file in different formats. These PSNR values indicate that the robustness of the technique is preserved. PSNR values between the original vessel image and stego image S. No. Vessel used image Watermark image used Secret used image PSNR Value 1 1.gif W1.jpg Secret 1.bmp 51.28 2 2.bmp W1.jpg Secret 1.bmp 51.30 3 3.bmp W1.jpg Secret 1.bmp 51.19 4 4.jpg W1.jpg Secret 1.bmp 51.23 5 5.png W1.jpg Secret 1.bmp 51.22 6 6.gif W1.jpg Secret 1.bmp 51.30 7 7.jpg W1.jpg Secret 1.bmp 51.23 8 8.png W1.jpg Secret 1.bmp 51.27 9 9.gif W1.jpg Secret 1.bmp 51.27 10 10.jpg W1.jpg Secret 1.bmp 51.26 1.gif 11 1.gif W2.png Secret 2.jpg 51.25 12 2.bmp W2.png Secret 2.jpg 51.31 13 3.bmp W2.png Secret 2.jpg 51.21 14 4.jpg W2.png Secret 2.jpg 51.25 15 5.png W2.png Secret 2.jpg 51.22 16 6.gif W2.png Secret 2.jpg 51.28 2.bmp 17 7.jpg W2.png Secret 2.jpg 51.27 18 8.png W2.png Secret 2.jpg 51.28 19 9.gif W2.png Secret 2.jpg 51.27 20 10.jpg W2.png Secret 2.jpg 51.25 21 1.gif W3.bmp Secret 3.png 51.29 22 2.bmp W3.bmp Secret 3.png 51.31 23 3.bmp W3.bmp Secret 3.png 51.18 3.bmp 24 4.jpg W3.bmp Secret 3.png 51.24 25 5.png W3.bmp Secret 3.png 51.20 26 6.gif W3.bmp Secret 3.png 51.29 27 7.jpg W3.bmp Secret 3.png 51.26 28 8.png W3.bmp Secret 3.png 51.29 29 9.gif W3.bmp Secret 3.png 51.28 4.jpg 30 10.jpg W3.bmp Secret 3.png 51.26 Page5382

5.jpg 10.jpg 6.gif Secret 1.bmp 7.jpg Secret 2.jpg 8.jpg Secret 3.png 9.gif W1.jpg Page5383

1 3 5 7 9 PSNR VALUES ---> PSNR VALUES ----> PSNR VALUES ---> DOI: 10.18535/ijsrm/v5i6.04 53 52 51 Series1 W2.png 50 1 3 5 7 9 VESSEL IMAGES ----> Series2 The following graph indicates the comparison of psnr values of the ten test images (Secret3.bmp, W3.jpg used) between the original work and the proposed work. 52 W3.bmp 5. COMPARISON WITH THE EXISTING WORK:- The following graph indicates the comparison of psnr values of the ten test images (Secret1.bmp, W1.jpg used) between the original work and the proposed work. 51.5 51 50.5 50 1 3 5 7 9 VESSEL IMAGES ----> Series1 Series2 51.8 51.7 51.6 51.5 51.4 51.3 51.2 51.1 51 50.9 Series1 Series2 6. APPLICATIONS 1. TRACKING OF TRANSACTION Watermarks record the recipient in each legal sale or distribution of the work. If the work is misused (leaked to the press or illegally distributed), the owner could find out about who is the traitor. Visible watermarking is often adopted in this application but invisible watermark is even better. VESSEL IMAGES ----> The following graph indicates the comparison of psnr values of the ten test images (Secret2.bmp, W2.jpg used) between the original work and the proposed work. 2. COPY CONTROL It combines every content recorder with a watermark detector. When a copy-prohibit watermark is detected, the recording device will refuse to copy. 3. LOCATING CONTENT ONLINE Notifying the owner of where their content was found, allowing them to take any actions deemed necessary. It helps companies monitor that the right content is being used on the right sites at the right time, quickly identify unauthorized usage of content to enable a range of remedies, gather useful market intelligence about what consumers are accessing and where, measure the effectiveness of Page5384

marketing programs and campaigns, ensure more effective brand management online. DOI: 10.18535/ijsrm/v5i6.04 7. CONCLUSION The most important point in this technique is that human eye cannot perceive any change in the information in the bit-planes of an image, thus protecting the copyright of image. By using artificial neural network for image compression, we are able to use a larger size secret image for hiding in the vessel image. Thus combining watermarking with BPCS steganography increases the level of secret and secure communication. 8. REFERENCES [1] https://www.researchgate.net/publication/22902648 9_Image_Compression_Using_Neural_Network [2] https://www.cl.cam.ac.uk/teaching/0910/r08/work/ essay-ma485-watermarking.pdf [3] Daneshwari i. Hatti, Savitri Raju and Mahendra m. Dixit, Design of neural network as data flow model for image compression, International Journal of Image Processing and Vision Sciences (IJIPVS) ISSN(Print): 2278 1110, Vol-1 Iss-3,4,2012. [4] www.techopedia.com/definition/5967/artificialneural-network-ann [5] Ingemar Cox, Matthew Miller, Jeffrey Bloom and Mathew Miller, Digital Watermarking, Morgan Kaufmann, 2002. [6] Eiji Kawaguchi and Richard O. Eason, Principle and applications of BPCS-Steganography,1999, SPIE 3528, Multimedia Systems and Applications, 464, Conference Volume 3528. Author Profile Ms. Rashmeet Kaur Chawla, received the B.Sc(Hons) Computer Science and M.Sc. Computer Science degrees from University of Delhi in 2014 and 2016 respectively. Her field of specialization is Information Security. Dr. Sunil Kumar Muttoo, Professor, University of Delhi. He has a teaching experience of 36 years. He guides research students on the topics: information security and cryptography. He has many papers published in various national and international journals. Page5385