QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Similar documents
A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

QR Code Watermarking Algorithm based on Wavelet Transform

DIGITAL IMAGE WATERMARKING APPROACH BASED ON QR AND DWT METHOD

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Efficient Image Steganography Using Integer Wavelet Transform

Implementation of ContourLet Transform For Copyright Protection of Color Images

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Feature Based Watermarking Algorithm by Adopting Arnold Transform

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ROBUST INVISIBLE QR CODE IMAGE WATERMARKING IN DWT DOMAIN

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Robust DWT Based Technique for Digital Watermarking

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Invisible Watermarking Using Eludician Distance and DWT Technique

Robust Image Watermarking based on DCT-DWT- SVD Method

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Fingerprint Image Compression

Metamorphosis of High Capacity Steganography Schemes

Digital Watermarking with Copyright Authentication for Image Communication

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

QR-Code Image Steganography

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

A reversible data hiding based on adaptive prediction technique and histogram shifting

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Data Hiding in Video

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

Denoising and Edge Detection Using Sobelmethod

Performance Evaluation of Fusion of Infrared and Visible Images

Reversible Data Hiding VIA Optimal Code for Image

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Technique to Digital Image Watermarking Using DWT for Real Time Applications

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

DWT-SVD based Multiple Watermarking Techniques

Digital Image Watermarking Using DWT Based DCT Technique

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

A Novel NSCT Based Medical Image Fusion Technique

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Improved Qualitative Color Image Steganography Based on DWT

IN recent years Copyright protection and authentication

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Orientation Filtration to Wavelet Transform for Image Compression Application

Enhanced Implementation of Image Compression using DWT, DPCM Architecture

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

A Robust Watermarking Algorithm For JPEG Images

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Digital watermarking techniques for JPEG2000 scalable image coding

Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques 1 Ji-Hong Chen and 1 Chin-Hsing Chen

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Design of 2-D DWT VLSI Architecture for Image Processing

Adaptive Quantization for Video Compression in Frequency Domain

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Image Resolution Improvement By Using DWT & SWT Transform

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

DWT-SVD Based Digital Image Watermarking Using GA

A DWT Based Steganography Approach

Implementation and Comparison of Watermarking Algorithms using DWT

International Journal of Advanced Research in Computer Science and Software Engineering

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Digital Image Watermarking Scheme Based on LWT and DCT

A blind Wavelet-Based Digital Watermarking for Video

Generation of Digital Watermarked Anaglyph 3D Image Using DWT

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

A new robust watermarking scheme based on PDE decomposition *

IMAGE COMPRESSION USING HYBRID TRANSFORM TECHNIQUE

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain

MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING

Hybrid Image Compression Technique using Huffman Coding Algorithm

Wavelet Transform (WT) & JPEG-2000

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Comparison of wavelet based watermarking techniques Using SVD

Data Hiding on Text Using Big-5 Code

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

An Improved Performance of Watermarking In DWT Domain Using SVD

Keywords - DWT, Lifting Scheme, DWT Processor.

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

A Blind Wavelet-Based Digital Watermarking for Video

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Invisible and Robust Color Image Watermarking in Contourlet Domain for Image Authentication

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Transcription:

Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1233-1244 Research India Publications http://www.ripublication.com QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication Munde Saraswati 1*, Munde Maroti R. 1, Munde Sainath 1 Shivpuje Prakash R. 1 and Dr. H.S. Fadewar 2 1 Research Scholar, Swami Ramanand Teerth Marathwada University Nanded, School of Computational Sciences, Maharashtra, India. 2 Assistant Professor, Swami Ramanand Teerth Marathwada University Nanded, School of Computational Sciences, Maharashtra, India. Abstract Digital Watermarking is a technology used for the copyright protection of digital applications. Watermarking is a concept of embedding a special symbol, watermark, into an electronic document so that a given piece of copyright information is permanently tied to the data. It is an effective way to protect copyright of multimedia data even after its transmission. In recent years image watermarking techniques are grown-up. In this science era with the development of technology and internet, the protection and authentication of data is essential. Watermarking techniques provide solution to this problem. QR code being so versatile because of its structural flexibility that it leads to so many diverse field for research such as increasing data capacity, security applications such as different kinds of watermarking. We have used QR code as cover image and as secret image to protect it from other users. This paper is representing a new watermarking technique with QR code to protect the secret image. In the method described here the image is first encrypted in random matrix, then it is invisibly watermarked in cover image and no information about the secret image and cover image is needed for extraction of secret image, so it more secure. Keywords: Watermarking, DWT, QR code, Watermark embedding, Watermark extraction, Counterlet Transform

1234 Munde Saraswati et al 1. INTRODUCTION Increase in use of Digital Media, raises the problem of data protection and authentication. Data can be can be easily copied. Digital Watermarking Technique gives the best solution to protect data. In this technique the data is hidden within the cover image so stranger cannot get it without having proper guidance. Many methods used for the invisible Digital Watermarking required some information about the cover image. But we do not require it for secret image extraction, so it is more secure. We are using QR code which itself hide the information but which can be easily scanned.we can use this method to hide image in QR code and to hide QR code in an image. In both the cases the information is detectable under the influence of various attacks. 1.1 Discrete Wavelet Transform It decomposes the image into different frequency ranges such as low frequency, middle frequency and high frequency. In same way the image can further be decomposed into n levels. Here we are using 3level decomposition for better result. In two dimensional applications, for each level of decomposition, we first perform the DWT in the vertical direction, followed by the DWT in the horizontal direction. After the first level of decomposition, there are 4 sub-bands: LL, LH, HL, and HH. For each successive level of decomposition, the LL sub-band of the previous level is used as the input. To perform second level decomposition, the DWT is applied to LL and so on. LL2 LH2 LH HL2 HH2 HL HH Figure 1: DWT decomposition 1.2 Quick Response Code It is two dimensional barcode consists of black modules arranged in white background. It can store large alphanumeric information and easily readable by scanner. A QR code is capable of being read in 360 degree from any direction thus eliminating interference. The QR Code system has become admired outside the automotive industry due to its fast readability and greater storage capacity than that of the UPC barcode. It is higher information density. It is small in size than that of Barcode. Data can be restored even if the symbol is partially dirty or damaged.

QR Code Watermarking Algorithm Based on DWT and Counterlet 1235 Some features that describe how QR code is better in comparison with conventional barcodes have been listed out in following table Table 1: Comparison of QR code and Barcode QR Code Barcode UPTO 7089 numeric digits 10-20 digits 40 digit Numeric (approx 5 mm 5mm) 10 digit Numeric (approx 50 mm 20 mm) Supports 360d reading Horizontal reading QR code is used for Advertising, Business cards, Social networking, Branding, registration. 2. PROPOSED METHOD 2.1 Watermark Embedding The step of embedding process are outlined as follows Step of watermark image with secret key (1) The watermark image was produced as a bit sequence of watermark S. The data and background values were set to 1 and 1, respectively. S = {s i, 1 i N}, s i ε { 1,1} (1) Where, N is the total number of pixels in the watermark image (2) The pseudo-random sequence (P) whose each number can take a value either 1 or 1 was randomly generated with a secret key for embedding and extracting of the watermark. P = {p i, 1 i N}, p i ε { 1,1} (2) Step of QR code image (1) The two-level DWT of M Mimage (t i ) i t was computed for QR code image.

1236 Munde Saraswati et al (2) A watermark was then embedded in sub band LH2or HL2 or HH 2. According to the rule: t i = t i + α. p i. s i, i = 1,2,, N (3) Where, t i is input image, t i is output image with watermark. α is a magnitude factor which is a constant determining the watermark strength. (3) After that, the inverse DWT (IDWT) was then applied to obtain the watermarked image. (4) Compute PSNR QR Code 2-level DWT Sub band? Watermar k Pseudo Random KEY LH2 HL2 HH2 2-level IDWT 2-level IDWT Figure 2: Watermark Embedding Process

QR Code Watermarking Algorithm Based on DWT and Counterlet 1237 2.2 Watermark Extraction The watermark extraction algorithm did not use the original QR code image. A prediction of the original value of the pixels is however needed. Thus, a prediction of the original value of the pixels was performed using noise elimination technique. In this paper, we use an averaging3 3 mask whose elements were fixed to 1/9. The extraction process are outlined as follows (1) The predicted image t i could be obtained by smoothing the input image t i with a spatial convolution mask. The prediction of the original value can be defined as: c c t i = 1 c c t i (4) i Where, c is the size of the convolution mask. The watermarked image and the predicted image were DWT transformed independently (2) The estimate of the watermark S i is indicated by the difference between t i and t i as: δ = t i t i = α. p i. s i (5) (3) The sign of the difference between the predicted and the actual value is the value of the embedded bit: sgn(δ i ) = p i. s i (6) 3. COMPUTE NC The watermark was then estimated by multiplying pseudo- random number to the embedded bit. If an incorrect pseudo random sequence was to be used, the scheme would not work.

1238 Munde Saraswati et al Watermarked Smoothing Predicted 2 level DWT 2 level DWT Select sub band LH2 or HL2 or HH2 Select sub band LH2, HL2, HH2 - KEY P*S Pseudo Random X Extracted tracted Figure 3: Watermark Extracting Process using DWT 4. CONTOURLET TRANSFORM: Contourlets form a multiresolution directional tight frame designed to efficiently approximate images made of smooth regions separated by smooth boundaries. The Contourlet transform has a fast implementation based on a Laplacian Pyramid decomposition followed by directional filter banks applied on each bandpass sub band. Contourlet transform is a double filter bank structure. It is implemented by the pyramidal directional filter bank (PDFB) which decomposes images into directional subbands at multiple scales. In terms of structure the contourlet transform is a cascade of a Laplacian Pyramid and a directional filter bank. Block diagram of embedding and extraction of data in contourlet domain is shown in Fig.4.The secret data is first encrypted using proper algorithm and then embedding algorithm is applied.

QR Code Watermarking Algorithm Based on DWT and Counterlet 1239 Text Image Cover image Countourlet Decomposition Find suitable sub band Embedding algorithm Inverse contourlet Decomposition Stego Image Text Image Extraction Algorithm Countourlet Decomposition Figure 4 : : Watermark Extracting Process using COUNTOURLET TRANSFORM 5. SIMULATION RESULTS Table 1: PSNR vs NC Sub band PSNR NC Extracted watermark LH 43.0615 0.9525 HL 43.1514 0.9611 HH 44.2675 0.9916 Table 2: Watermark Extraction Alpha 5 Alpha 10 Alpha 15 Alpha 20 Alpha 25 Alpha 30 Alpha 35 Alpha 40 Alpha 45

1240 Munde Saraswati et al Table 3: PSNR and NC of QR decode Image using DWT α PSNR NC DECODE QR Code 5 46.1926 0.9794 10 40.1720 0.9903 15 36.6502 0.9942 20 34.1514 0.9963 25 32.3132 0.9972 30 30.6296 0.9981 35 29.2906 0.9991 40 28.1308 0.9993 45 27.1078 0.9994 Table 4: PSNR and NC of QR decode Image using Countourlet Transform α PSNR NC DECODE QR Code 5 46.4564 0.9810 10 40.4359 0.9936 15 36.9141 0.9969 20 34.4153 0.9985 25 32.4771 0.9991 30 30.8935 0.9993 35 29.5545 0.9994 40 28.3946 0.9996 45 27.3717 0.9996 Figure 4: QR image

QR Code Watermarking Algorithm Based on DWT and Counterlet 1241 Figure 5: Watermarked image Figure 6: Watermarked QR image Figure 7: Predicted image

1242 Munde Saraswati et al Figure 8: Extracted watermark PSNR =40.1720 NC = 0.9903 EXTENSION RESULTS Figure 9: QR image (Contourlet transform) Figure 10: Watermarked image (Contourlet transform)

QR Code Watermarking Algorithm Based on DWT and Counterlet 1243 Figure 11: Watermarked QR image (Contourlet transform) Figure 12: Predicted image (Contourlet transform) Figure 13: Extracted image (Contourlet transform) PSNR =40.4359 NC = 0.9936

1244 Munde Saraswati et al 5. CONCLUSION This paper presented a digital watermarking technique, whereby a binary image is watermarked an embedded in a QR Code image. The embedding process is presented in a LH, HL or HH sub band based on wavelet transform. The experimental results demonstrated that the algorithm can be recovering the watermark with an acceptable visual quality. The objective measures such as PSNR, NC and MAE are subject to magnitude factor. As the future work, the quality of the watermarked video Compared to original video was measured based on the Peak Signal to Noise Ratio (PSNR), Normalized Correlation (NC) and Mean Absolute Error (MAE). REFERENCES [1] Denso wave incorporated, http://www.densowave.com/qrcode/indexe. html. [2] Lumini A and Maio D (2000) A wavelet-based image watermarking scheme In:Proc. Int.Conf. Information Technology: Coding and Computing. pp.122-127. [3] Alattar AM(2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13: 1147-1156. [4] Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko. A Novel Secret Sharing Technique Using QR Code, International Journal of Image Processing (IJIP), Volume (4) : Issue (5), pp. 468-475, 2010. [5] QRCode, http://en.wikipedia.org/wiki/qr_code. [6] DENSO Wave Incorporated. What is a QR Code?, 2013. http://www.qrcode. com/en/. Accessed 10 Feb 2013. [7]M. J. Shensa, The Discrete Wavelet Transform Wedding À Trouse and Mallat Algorithms, IEEE Trans. on Signal Processing, vol. 40, no. 10, October 1992.