QR Code Watermarking Algorithm based on Wavelet Transform

Similar documents
A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Digital Watermarking with Copyright Authentication for Image Communication

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on DCT-DWT- SVD Method

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A new robust watermarking scheme based on PDE decomposition *

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Data Hiding in Video

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ROBUST INVISIBLE QR CODE IMAGE WATERMARKING IN DWT DOMAIN

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Watermarking Algorithm For JPEG Images

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Robust Image Watermarking using DCT & Wavelet Packet Denoising

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Digital Image Steganography Techniques: Case Study. Karnataka, India.

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Digital watermarking techniques for JPEG2000 scalable image coding

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

Digital Image Watermarking Scheme Based on LWT and DCT

Comparison of wavelet based watermarking techniques Using SVD

DWT-SVD based Multiple Watermarking Techniques

Robust DWT Based Technique for Digital Watermarking

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Adaptive Quantization for Video Compression in Frequency Domain

Efficient Image Steganography Using Integer Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

An Improved Performance of Watermarking In DWT Domain Using SVD

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain

Comparison of Digital Water Marking methods

Implementation of ContourLet Transform For Copyright Protection of Color Images

DIGITAL IMAGE WATERMARKING APPROACH BASED ON QR AND DWT METHOD

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

Improved Qualitative Color Image Steganography Based on DWT

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Digital Image Watermarking Using DWT Based DCT Technique

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Enhancing the Image Compression Rate Using Steganography

Metamorphosis of High Capacity Steganography Schemes

Digital Watermarking: Combining DCT and DWT Techniques

Digital Watermarking Using 2-DCT

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques 1 Ji-Hong Chen and 1 Chin-Hsing Chen

IN recent years Copyright protection and authentication

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

Implementation and Comparison of Watermarking Algorithms using DWT

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Digital Image Watermarking: An Overview

A DUAL WATERMARKING USING DWT, DCT, SVED AND IMAGE FUSION

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Recent Researches in Applied Informatics and Remote Sensing

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

A New DCT based Color Video Watermarking using Luminance Component

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

A HYBRID WATERMARKING SCHEME BY REDUNDANT WAVELET TRANSFORM AND BIDIAGONAL SINGULAR VALUE DECOMPOSITION

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Image denoising in the wavelet domain using Improved Neigh-shrink

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

A blind Wavelet-Based Digital Watermarking for Video

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Combined Hashing/Watermarking Method for Image Authentication

A combined fractal and wavelet image compression approach

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

Implementation of H.264/AVC Video Authentication System Using Watermark

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Transcription:

2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree Wongtrairat 3 1 Department of Electrical Engineering, Faculty of Engineering, Burapha University Chonburi, 20131, Thailand, e-mail: jantanap@eng.buu.ac.th 2 School of Computer Engineering, Suranaree University of Technology Nakornrachasima, 30000, Thailand, e-mail: phorkaew@sut.ac.th 3 Department of Electronic Engineering, Faculty of Engineering and Architecture Rajamangla University of Technology Isan, Nakhonratchasima, 30000, Thailand, e-mail: wannaree.wo@rmuti.ac.th Abstract Copyright protection and authentication have become increasingly more important in daily life. The digital watermark is one of the techniques invented to tackle this issue. In this paper, a digitally invisible watermark is embedded in a QR code image by means of wavelet transform. In the embedding process, a binary image, logo, is transformed into a corresponding watermark and then embeded into a selected subband. The experimental results illustrated that, for all the cases considered in this paper is more robustness to attacks and as such it can serve as a viable copyright protection and authentication tool. Keywords QR Code, Watermark, Video, Wavelet Transform I. INTRODUCTION Digital waternark is a pattern of bits inserted into a digital image, audio or video that identifies the copyright and authenticate information. The goal of watermark technique is to embed the secret information seamlessly hidden within into original message, which is robust against attacks. In recent years, some researchers have proposed the adoption of watermark techniques. The watermark can also be inserted in the original spatial domain of the image[1-2]. In [1], the main disadvantage of spatial domain was that it easy to be hacked and attacked. In [2], the proposed method embeded the copyright image into the original image using (N,N) secret sharing scheme. This method could resist contaminations such as JPEG compression, resize and noise addition. There are many techntiques to embed the watermark into frequency domain of the original image. The techniques operating on a frequency domain use transformations such as Discrite Cosine Transform(DCT), Discrete Fourier Transform(DFT) and Discrete Wavelet Transform(DWT). In [3], a watermark technique of multispectral image is performed in the wavelet transform. In [4], the authors proposed a scheme for color images using wavelet transform based on texture properties and secret sharing. In this paper, we will propose the blind watermarking algorithm by means of two-level discrete wavelet transform (DWT) embedded in a QR code image. This paper is organized as follows. Some backgrounds on QR code and watermark are presented in section 2. Section 3 describes watermark embedding and extraction. In Secction 4, the objective and subjective evaluations are discussed. The last section presents our conclusions. A. QR Code [5] II. BACKGROUND QR code (Quick Response Code) is the trademark for a type of two-dimensional barcode. A barcode is an optically machine-readable label that is attached to an item and that records relavant information. The information encoded by a QR code may be made up of four standardized types ("modes") of data (numeric, alphanumeric, byte / binary, Kanji) or, through supported extensions, virtually any type of data. The QR Code system has become popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. Applications include product tracking, item identification, time tracking, document management, general marketing, and much more. (a) (b) Fig. 1. (a) QR code (b) QR code Structure [5] A QR code consists of black modules (square dots) arranged in a square grid on a white background, which can be read by an imaging device, such as a camera or mobile, and 978-1-4673-5580-3/13/$31.00 2013 IEEE 791

processed using Reed-Solomon error correction until the image can be appropriately interpreted. Data is then extracted from the patterns present in both horizontal and vertical components of the image. Fig. 1(a) shown the example of QR code and the structure of QR code shown in Fig.1(b) B. Watermark A Watermark is the process of hiding digital information in the carrier signal such as voice, image, video etc. It is also found embedded into digital data for identifying ownership of the copyright. Digital watermarking techniques can be classified into two categories with respect to operational domains, which are: Spatial domain watermarking, the embedding process is done by directly modifying the pixel values. Frequency domain watermarking, the embedding process is done by embedding the information in the transform space by modifying for example the frequency coefficients. Nevertheless, most signal processing paradigms found in recent literatures can be well characterized as the frequency domain operation. Moreover, several good perceptual models are developed in the frequency domain, with great successes reported. { s 1 i N}, s {-1,1} S = i, i (1) where N is the total number of pixels in the watermark image. ii. The pseudo-random sequence (P) whose each number can take a value either 1 or 1 was randomly generated with a secret key for embedding and extracting of the watermark. Step of QR code image I. II. { p 1 i M}, p { -1,1} P = i, i (2) The two-level DWT of MxM image ( ) i t was computed for QR code image. A watermark was then embedded in subband LH 2 or HL 2 or HH 2. According to the rule: ' ti = ti + α.p i.si, i = 1, 2,..., N (3) where t i is input image. t i is output image with watermark. α is a magnitude factor which is a constant determining the watermark strength. III. After that, the inverse DWT (IDWT) was then applied to obtain the watermarked image. IV. Compute PSNR III. THE PROCESS OF WATERMARKING In this study, a binary image of Burapha University logo, is a chosen as the watermark. The process of embedding this watermark was performed on a QR code image on its frequency domain. The QR code image was first decomposed by a two-level two-dimensional wavelet transform as shown in Fig.2. The subsequent watermark extraction, are blided in a sense that it did not require the original QR code image in order to recover the embedding watermark. There were two steps in our algorithm: watermark embedding and watermark extraction. Fig. 3. Watermark Embedding Process Fig. 2. 2-level 2-dimensional wavelet transform A. Watermark Embedding The step of embedding process are outlined as follows (Fig.3): Step of watermark image with secret key i. The watermark image was produced as a bit sequence of watermark S. The data and background values were set to 1 and 1, respectively.. B. Watermark Extraction The watermark extraction algorithm did not used the original QR code image. A prediction of the original value of the pixels is however needed. Thus, a prediction of the original value of the pixels was performed using noise elimination technique. In this paper, we use an averaging3 3 mask whose elements were fixed to 1/9. The extraction process are outlined as follows (Fig.4): I. The predicted image t i could be obtained by * smoothing the input image t i with a spatial 792

convolution mask. The prediction of the original value can be defined as: 1 c c * t i = ti (4) c c i where c is the size of the convolution mask. The watermarked image and the predicted image were DWT transformed independently. II. The estimate of the watermark s i is indicated by * the difference between t i and t i as: * δ = t i - t i = α.p i.s i (5) III. The sign of the difference between the predicted and the actual value is the value of the embedded bit: sgn(δ i )= p i.s i (6) IV. Compute NC The watermark was then estimated by multiplying pseudo- random number to the embedded bit. If an incorrect pseudo random sequence was to be used, the scheme would not work. Fig. 4. Watermark Extracting Process IV. EXPERIMENTAL RESULTS A. Performance Evaluation To evaluate the performance of the algorithm, a similar measurement between the original watermark( S ) and the extract watermark( S ) was computed by using normalized correlation (NC), as in (7) NC= M i= 1 M i= 1 SiSi In addition, the quality of the watermarked video compared to original video was measured based on the Peak Signal to Noise Ratio (PSNR). The PSNR formula is expressed as follows: PSNR= 10log m 1 n 1 1 m n i= 0 j= 0 2 Si b ( 2 1) ( O( i, j) R ( i, j) ) 2 b is the number of bits used to represent in the pixel. m n is a size of image. O( i, j) is the original pixel value. R ( i, j) is the reconstructed pixel value. B. Simulation and Results A QR code image, of size 400x400 pixel was used for the experiment in Fig 5(a). The watermark image was a binary image of Burapha University logo, as depicted in Fig 5(b). The watermarking was tested with the following parameters: α are 5,10,15,,50 and the key is 100. In magnitude factor ( ) Table 1, the PSNR and NC of the QR code image with difference magnitude factor in HH 2 subband. All case can be correct QR code. A high magnitude factor value on one hand could result in low PSNR, and hence significantly distorted watermark image (as shown in Fig 6). On the other hand, it increases NC value in watermark extraction (as shown in Fig 7), thereby lowering the noise. Baring in mind, this trade off between PSNR and NC, we empirically chose the magnitude factor of 25. Subsequently, the watermark subbands were changed to LH 2 HL 2 and HH 2. The comparisons are illustrated in Table 2. It can be noted accordingly that the differences in PSNR are negligible, while the NC value of HH 2 yeild the watermark that is most resemblant to the original image. The following experiment is therefore carried out with the watermark embedded in HH 2. Once aplied with the DWT, the significant information is aggregate within the low-frequency subband. As a result, embeding the watermark in the higher frequency band does not destroy much of the information, hence resulting in higher NC than otherwise. Fig. 7 shows extracted watermark with difference magnitude factors. All extracted watermark images contain some visual noise because of the watermark extracting process did not employed the original QR code image. In practices, the transmission of an image can be corrupted by unpredictable noise comtaminated in the network communication. We therefore tested the robustness of our algorithm with some attacks such as Salt and Pepper noise, (7) (8) 793

Gaussian noise,jpeg, and cutting in Fig.8. In Table 3, we can see that for all of cases, the watermark could be recovered. (a) α =5 α = 10 α = 15 α = 20 α = 25 α = 30 α = 35 α = 40 α = 40 α = 50 (b) Fig. 5. a) Original QR code Image (b) Watermark Image TABLE I. α 5 10 15 20 25 30 35 40 45 50 TABLE II. PSNR AND NC OF QR CODE IMAGE PSNR 51.2128 43.5675 39.808 37.6548 35.7849 34.1767 32.6423 31.5694 30.6368 29.7186 NC 0.8224 0.8451 0.8552 0.8825 0.899 0.9116 0.9161 0.9181 0.9201 0.9214 Decode QR Code COMPARISON OF PSNR AND NC OF LH, HL AND HH SUNBAND WITH Subband PSNR NC LH 35.7829 0.7127 HL 35.7896 0.5818 HH 35.7849 0.899 α = 25 Extract Watermark Fig. 6. QR code Image with watermark 794

Salt & Pepper (0.02) α =5 α =5 α = 15 α = 20 α = 25 α = 30 α = 40 α = 45 α = 35 Salt & Pepper (0.05) Fig. 7. Watermark Extraction TABLE III. Attack Type PSNR NC No Attack 35.7849 0.8990 Salt and Pepper noise (0.01) 23.1682 0.7788 Salt and Pepper noise (0.02) 20.1835 0.6790 Salt and Pepper noise (0.05) 16.0474 0.4578 Gaussian noise (0.005) 21.9971 0.2791 Gaussian noise (0.01) 22.0313 0.2813 JPEG (Q=40) 34.0304 0.4444 JPEG (Q=50) 34.3594 0.5603 Attack Type Gaussian (0.005) VARIOUS KINDS OF ATTACKS QR code image with watermark Decode QR Code Gaussian (0.01) JPEG (Q=40) Watermark Extraction Salt & Pepper (0.01) JPEG (Q=50) Fig. 8. 795 Attack of Watermark Extraction

V. CONCLUSIONS AND FUTURE WORK This paper presented a digital watermarking technique,whereby a binary image is watermarked an embeded in a QR code image. The embedding process is presented in a LH, HL or HH subband based on wavelet transform. The experimental results demonstrated that the algorithm can be recover the watermark with an acceptable visual quality. The objective measures such as PSNR and NC are subject to magnitude factor. As the future work, we are trying to find more efficient ways to withstand more severe attacks such as stronger noise, high compression, geometric distortion and occlusion etc. REFERENCES [1] W.N. Cheung, Digital image watermarking in spatial and transform domains, Proc. TENCON, pp. 374-378, 2000. [2] Sushma Yalamanchili, M. Kameswara Rao, Copyright Protection of Gray Scale Images by Watermarking Technique using (N,N) Secret Sharing Scheme, Journal of Emerging Technologies in Web Intelligence, Vol 2, No 2, pp.101-105, May 2010. [3] Y. Rangsanseri, J. Panyaveraporn and P. Thitimajshima, PCA/Wavelet Based Watermarking of Multispectral Images, 2005 International Symposium on Remote Sensing (ISRS2005), Korea, 12-14 Oct. 2005 [4] Nagaraj V. Dharwadkar and B.B.Amberker, Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing, International Journal of Information and Communication Engineering,Vol 6, No 2,pp 94-101, 2010. [5] QR Code, http://en.wikipedia.org/wiki/qr_code 796