Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image. Priyanka*, Charu Jain** and Geet Sandhu***

Similar documents
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Optimized Watermarking Using Swarm-Based Bacterial Foraging

An Improved Performance of Watermarking In DWT Domain Using SVD

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

A New DCT based Color Video Watermarking using Luminance Component

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Image and Video Watermarking

Improved Qualitative Color Image Steganography Based on DWT

Digital Image Steganography Techniques: Case Study. Karnataka, India.

INFORMATION THEORETIC ANALYSIS OF THE CAPACITY OF MULTI CHANNEL DIGITAL IMAGE WATERMARKING. A Thesis by

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

Reversible Data Hiding

A New Approach to Compressed Image Steganography Using Wavelet Transform

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Enhancing the Image Compression Rate Using Steganography

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Digital Watermarking with Copyright Authentication for Image Communication

Robust Image Watermarking based on DCT-DWT- SVD Method

Digital Image Watermarking Scheme Based on LWT and DCT

Digital Watermarking of Still Images using the Discrete Wavelet Transform

Invisible Watermarking Using Eludician Distance and DWT Technique

Data Hiding in Video

An Oblivious Image Watermarking Scheme Using Multiple Description Coding and Genetic Algorithm

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A Digital Video Watermarking Algorithm Based on LSB and DCT

FRAGILE WATERMARKING USING SUBBAND CODING

Real Time Hybrid Digital Watermarking Based On Key Dependent Basis Function

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

Robust DWT Based Technique for Digital Watermarking

VIDEO WATERMARKING USING DCT AND DWT TRANSFORMS

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

On domain selection for additive, blind image watermarking

Digital Image Steganography Using Bit Flipping

Robust Digital Image Watermarking based on complex wavelet transform

A robust blind image watermarking based on Double Haar Wavelet Transform (DHWT)

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

A New approach of SVD-DWT Video Watermarking Embedding Algorithm

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

Implementation and Comparison of Watermarking Algorithms using DWT

Combined Hashing/Watermarking Method for Image Authentication

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A new robust watermarking scheme based on PDE decomposition *

A Statistical Comparison of Digital Image Watermarking Techniques

Optimization of Fidelity in Digital Image Watermarking Using a New Genetic Algorithm

Copy Protection for Multimedia Data based on Labeling Techniques

IAJIT First. Online Publication. Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT domains. 1.

A High Payload Audio Watermarking Algorithm Robust against Mp3 Compression

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

International Journal of Advance Research in Computer Science and Management Studies

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE

Rohit Chhabra 1, Dr. R R Sinha 2

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Reversible Data Hiding VIA Optimal Code for Image

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

DWT-SVD based Multiple Watermarking Techniques

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

Audio Watermarking using DWT-SVD-BFO

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design

EE 5359 Multimedia project

Audio Watermarking using Empirical Mode Decomposition

A Robust Watermarking Algorithm For JPEG Images

A new wavelet based logo-watermarking scheme

Transcription:

e t International Journal on Emerging Technologies 5(1): 220-224(2014) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image Priyanka*, Charu Jain** and Geet Sandhu*** * M. Tech. Scholar (CSE), Computer Science & Engineering, Amity University, Gurgaon, India ** Sr. Lecturer, Computer Science & Engineering, Amity University, Gurgaon, India ***Lecturer, Computer Science & Engineering, Amity University, Gurgaon, India (Corresponding author: Priyanka) (Received 05 May, 2014 Accepted 10 June, 2014) ABSTRACT: The rapid increase of digitized media because of the proliferation of networked multimedia has created many issues like related to copyright protection, easily copying and transmitting the digital data. This has created the need for various techniques which helps to protect the digital media over the internet. Digital watermarking is one of the solutions. Digital watermarking is a technique which is used to hide the ownership information in the digital media. In this paper, we have implemented a technique based on Bacterial Foraging Optimization (BFO) for watermarking the digital image. The work has been implemented in the MATLAB and the results show its robustness against the various attacks. The quality parameters such as PSNR, MSE and Similarity Ratio are also being used to check the quality of watermarked image which provides the satisfactory results. Keywords: Digital watermarking, Bacterial Foraging Optimization, BFO, PSNR, MSE I. INTRODUCTION With the fast development of Internet, the transmitting the digital media which is available in the form of text, audio, video, image has become easy [1]. But copying, modifying and transmitting these media illegally has become a major issue. To face all these problems, it is necessary to develop strong techniques. For protecting the digital media, the digital watermarking is used as a technique. Digital watermarking is a branch of information hiding which is used to hide proprietary information in digital media like photographs, digital music, or digital video [2]. The basic process of watermarking involves the two steps, embedding the watermark and extracting the watermark. For embedding the watermark, we need the cover image in which the watermark (secret information) can be embedded [3]. Fig. 1. Basic watermark embedding process. Fig. 2. Basic watermark recovery process. As shown above, a secret key is used in the embedding and extracting watermark from the image. The secret key is used to enforce the security and it can be a private or public. Many techniques for watermarking have been proposed by various researchers in the after the start of watermarking era in 1993 [3]. Basically two domains are there which are spatial and transform domain. The spatial domain is easy to implement and simple but weak against the attacks while the frequency domain watermarking are more robust to attacks, however, they are more complex as compared to spatial domain [2]. In this paper, we have proposed a digital watermarking technique based on Bacterial Foraging Optimization (BFO) for the digital images. The rest of the paper has been organized as below. Section II describes the literature review of various techniques, Section III describes the Proposed Scheme for digital watermarking based on BFO, Section IV shows the performance evaluation for the proposed scheme and finally Section V provides the conclusion and future scope.

II. LITERATURE SURVEY The concept of digital watermarking came into 1990 [4-5] and 1993. Tirkel et al [6] coined the word water mark which later became watermark. There are three main steps in the watermarking which are watermark signal design, watermark embedding and extracting of the watermark but mostly the watermark signal design and embedding are considered as one step and extracting the watermark as second step [7-9]. Many approaches have been published for the digital watermarking which are robust to the attacks. We also have used the high frequency areas to store the watermark so we here discuss only the approach of transform domain in DCT, DWT and DFT domain and BFO. The DCT approach is robust to image processing operation but weak against the geometric attacks. At the same time, the DCT based approach is difficult to design. DCT approach is classified under the Global and Block Based watermarking [2]. Cox et al [10] used firstly the DCT based watermarking algorithm to embed a robust watermark in the perceptually significant portion of the Human Visual System. DWT approach was introduced in [11] which uses the same procedure as the DCT but the transformation of the image into its transform domain is different which makes the difference. DWT approach performs more robust than DCT in various applications [2]. DFT approach was studied because it proved its robustness against the geometric attacks. There are two types of DFT based watermarking techniques, one in which the watermark is directly embedded and other in which the watermark is template based embedding [2]. Bacteria Foraging Optimization (BFO) Algorithm was proposed by Passino. It is a newcomer in the natureinspired optimization algorithms. From the last five decades, optimization algorithms like Genetic Algorithms, Evolutionary Programming, Evolutionary Strategies (ES), have been dominating the realm of optimization algorithms which draw their inspiration from evolution and natural genetics [12]. Bacterial Foraging Optimization Algorithm ( BFOA) is inspired by the pattern exhibited by the foraging behavior of E. coli bacterium. A bacterium searches for nutrients by moving small steps is known as chemotaxis and mimicking chemotactic movement of virtual bacteria in the problem search space is the basis of the BFOA [12]. We have implemented the BFO algorithm for the watermarking of digital image and BFO is used to find the high frequency areas of the image where the watermark will be inserted. Priyanka, Jain and Sandhu 221 III. BFO BASED DIGITAL WATERMARKING TECHNIQUE We have defined a BFO based algorithm that is being used to hide the input data secretly in an image. As the name suggest the approach is based on the basic to bacterial movement. To perform the data encoding, ADAPTIVE algorithm is applied over the image. In this work, we have defined a BFO based approach to identify the high frequency areas where the data will be stored. The basic steps of the algorithms are mentioned as follows: Step 1. Get the Cover Image and Hidden Image as input. Step 2. Initialize BFO parameters respective to the image. Step 3. Set image pixels as initial population set. Step 4. Read each pixel of population set respective to the bacteria S for chemo tactic step and find the cost of location in image Step 5. Perform the bacterial movement respective to swimming and tumbling. Step 6. Implement the swarming process so that the bacterial patterns can be observed and estimated. It will also perform the similar patterns in a group Step 7. Perform the reproduction by performing the bacterial splition and place them in same location with same feature vectors. Step 8. Identify the group of dead bacteria and eliminate them Step 9. Collect the result pixel and form watermarking on identified image. The basic model can be described as under: Fig. 3. Basic Model. IV. EXPERIMENTAL RESULTS The evaluation parameters have been used to check the quality of the image and to find the error between the watermarked and input original image.

We have used the PSNR (Peak Signal to Noise Ratio), MSE (Mean Squared Error) and SSIM (Structured Similarity Index Measure) and the performance has also been checked under the various attacks like Salt and Pepper and Gaussian Filter. A. Mean Square Error (MSE) It is defined as the square of errors between cover image and watermarked image. The distortion in the image can be measured by MSE [13].,, 2 (i) Where: I(i,j) is the value of the pixel in the cover image. K(i,j) is the value of the pixel in the watermark image. m, n: rows and columns of image. B. Peak Signal to Noise Ratio (PSNR) It is the measure of quality of the image by comparing the cover image with the watermark image[13]. It is calculated as : 10 log 255 Where 255 is the peak signal for the image C. Structured Similarity Index Measure (SSIM) SSIM is a image quality metric that assesses the visual impact of three characteristics of an image: luminance, contrast and structure. Priyanka, Jain and Sandhu 222 Fig. 4. ((a)-(f) are the cover images and (g) Secret Image). SSIM measure the similarity between the two images, in our case between the original and watermarked image. The SSIM value lies between 0 to 1. If the value is 1 then it means the images are identical [13]. For our proposed work, we have used the 6 cover images named Baboon, Cameraman, peppers, boat and Lena of size 256 256 and a payload named copyright of size 50 20 is embedded in these cover images. D. PSNR and MSE Analysis The PSNR and MSE results for various images are provided as a result of implementation of the scheme based on BFO as: Original image PSNR for boat image : 33.2978 MSE for boat image : 30.4298 watermarked image Original image watermarked image PSNR for baboon image : 31.2168 MSE for baboon image : 49.1362

Priyanka, Jain and Sandhu 223 Results Analysis for the MSE on various images has been given as: Original image Watermarked image PSNR for Lena Image: 33.2769 MSE for Lena image: 29.3185 Below a table showing the PSNR, MSE and Similarity ratio results for various images as: Table 1: MSE, PSNR, Similarity Ratio Comparison. Cover Image 256 256 Payload 50 20 V. RESULTS ANALYSIS MSE PSNR Similarity Ratio Baboon Copyright 49.1362 31.2168 0.4721 Cameraman Copyright 31.2375 33.1840 0.6995 Peppers Copyright 30.4333 33.2973 0.6810 Lena Copyright 29.3185 33.2769 0.5874 Pirate Copyright 30.2942 33.3172 0.6622 Boat Copyright 30.4298 33.2978 0.5513 Results Analysis for the PSNR on various images has been given as: Results Analysis for the Similarity Ratio on images has been given as: various A. Performance Analysis under Attacks The work has been analysed under the Gaussian attack and Salt and Pepper attacks as shown the below: Watermarked image After Gaussian Noise

Watermarked After Salt and Pepper Image Noise VI. CONCLUSION AND FUTURE SCOPE The presented work was divided in three main layers. In first stage, the data encoding is performed using ADAPTIVE algorithm. In first layer, the BFO is applied over the image to identify the valid areas where data can be stored effectively. Once the areas are identified, the embedding of data over the cover image is performed. The presented work was implemented in MATLAB environment. The results show the significant results in terms of data storage and successful retrieval. The work is also tested under different kind of attacks. The results show the robustness of proposed work under these attacks. We have implemented the watermarking in the digital images using BFO approach. Watermarking can be deployed in following areas such as Encoding Secret Messages in Text, Images and Audio. REFERENCES [1] Ali Al-Haj, Combined DWT-DCT Digital Image Watermarking, Journal of Computer Science, 3(9): 740-746, 2007. [2] Vidyasagar M. Potdar, Song Han, Elizabeth Chang A Survey of Digital Image Watermarking Techniques 3rd International Conference on Industrial Informatics (INDIN 2005) 2005 IEEE. Priyanka, Jain and Sandhu 224 [3]. Frank Hartung, Martin Kutter, Multimedia Watermarking Techniques, Proceedings of the IEEE, Vol. 87, NO. 7, JULY 1999. [4]. K. Tanaka, Y. Nakamura, and K. Matsui, Embedding secret information into a dithered multilevel image, in Proc. 1990 IEEE Military Commun. Conf., Sept. 1990, pp. 216 220. [5]. Kiyoshi Tanaka, Yasuhiro Nakamura, Kineo Matsui Members Embedding the attribute information into a dithered image, Syst. Comput. Japan, Vol. 21, no. 7, 1990. [6]. A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, and C. Osborne, Electronic water mark, in Proc. DICTA 1993, Dec 1993, pp. 666 672. [7]. M. Barni, F. Bartolini, V. Cappellini, A. Piva and F. Rigacci, A M.A.P. Identification criterion for DCT based Watermarking, in Proc. Europ Signal Processing Conf.(EUSIPCO 98), Rhodes, Greece, Sept 1998. [8]. B. Chen and G.W. Wornell, Digital watermarking and information embedding using dither modulation, in Proc IEEE workshop multimedia signal Processing, Los Angeles, C.A, Dec 1998. [9]. Brian Chen and Gregory W. Wornell, Dither modulation: A new approach to the design of digital watermarking and information embedding in IS&T/SPIE s 11 th Annu. Symp. Electronic Imaging 99: Security and watermarking of multimedia contents, vol 3657, San Jose,CA, Jan 1999. [10] I.J Cox, J. Kilian, F.T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia in IEEE Transactions on Image Processing, vol. 6, no. 12, Dec.1997, pp:1673-1687 [11]. Kundur. D., Hatzinakos, D., Digital Watermarking using Multiresolution Wavelet Decomposition, Proc. IEEE Int. Conf. On Acoustics, Speech and Signal Processing, Seattle, Washington, vol. 5, pp. 2969-2972, May 1998. [12]. Heena, Dr. Himanshu Aggarwal, Color Image Quantization Based on Euclidean Distance Using Bacteria Foraging Optimization, IJECSE Volume1, Number 4, pp 2285-2290. [13]. www.mathworks.in