Robust Image Watermarking based on DCT-DWT- SVD Method

Similar documents
Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Speech Modulation for Image Watermarking

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Comparison of wavelet based watermarking techniques Using SVD

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

An Improved Performance of Watermarking In DWT Domain Using SVD

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DWT-SVD Based Digital Image Watermarking Using GA

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

International Journal of Advance Research in Computer Science and Management Studies

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Digital Image Watermarking Using DWT Based DCT Technique

Image Watermarking with RDWT and SVD using Statistical Approaches

Digital Watermarking with Copyright Authentication for Image Communication

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Data Hiding in Video

A New Spatial q-log Domain for Image Watermarking

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Digital Watermarking Using 2-DCT

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DWT-SVD based Multiple Watermarking Techniques

Robust biometric image watermarking for fingerprint and face template protection

A New Approach to Compressed Image Steganography Using Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform

Robust Digital Image Watermarking based on complex wavelet transform

A Robust Image Watermarking Scheme using Image Moment Normalization

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication

Feature Based Watermarking Algorithm by Adopting Arnold Transform

CHAPTER-6 WATERMARKING OF JPEG IMAGES

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Digital Watermarking: Combining DCT and DWT Techniques

Digital watermarking techniques for JPEG2000 scalable image coding

Implementation of ContourLet Transform For Copyright Protection of Color Images

A new robust watermarking scheme based on PDE decomposition *

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

On domain selection for additive, blind image watermarking

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Digital Image Watermarking Scheme Based on LWT and DCT

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DC Coefficients Based Watermarking Technique for color Images Using Singular Value Decomposition

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Improved Qualitative Color Image Steganography Based on DWT

Adaptive Quantization for Video Compression in Frequency Domain

Implementation of Audio Watermarking Using Wavelet Families

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Implementation of Audio Watermarking Using Wavelet Families

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

A Robust Watermarking Algorithm For JPEG Images

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Robust DWT Based Technique for Digital Watermarking

BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES

Research Article DCT-PCA Based Watermarking on E-governance Documents

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Optimized Watermarking Using Swarm-Based Bacterial Foraging

An Improved Blind Watermarking Scheme in Wavelet Domain

A Robust Image Hiding Method Using Wavelet Technique *

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

A HYBRID WATERMARKING SCHEME BY REDUNDANT WAVELET TRANSFORM AND BIDIAGONAL SINGULAR VALUE DECOMPOSITION

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Block Mean Value Based Image Perceptual Hashing for Content Identification

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 11, 2016 ISSN (online):

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Transcription:

Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete Wavelet Transform (DWT)-Singular Value Decomposition (SVD). The cover image is reordered before DCT is applied. The DCT coefficients of the reordered image are decomposed into sub bands using DWT. The singular values of the middle sub bands are found and watermark is embedded. Simulation results shows that this can survive attacks like rotation, cropping, JPEG compression and noising attacks and also can be used for copyright protection of multimedia objects. Keywords Discrete Wavelet transforms, Singular Value Decomposition, Discrete cosine transform. 1. INTRODUCTION Digital Watermarking is a technique to embed an imperceptible data called watermark into multimedia objects so as to discourage unauthorized copying or attesting the origin of the images. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed, and it can be recovered only with an appropriate extraction mechanism. The embedding of the watermark into the cover image must be done in such a way to achieve efficient tradeoffs among the three conflicting objectives of maximizing the strength of watermark to be inserted, minimizing distortion between the cover image and watermarked image, and maximizing the resilience to attacks. The effectiveness of a digital watermarking algorithm is indicated by the robustness of watermarked signal against degradations. These degradations may result from processing and transmission or from deliberate/intentional attacks. Deliberate attacks are performed to destroy the watermark. Watermarking can be categorized according to their processing domain, signal type of the watermark, and hiding location. Watermark embedding is performed in either spatial domain or frequency domain. There are different types of attacks: geometrical attacks, noising attack, de-noising attack, compression attack and image processing attack. Geometrical attack causes synchronization errors during the extraction process of the watermark due to which the quality of the extracted watermark is affected. Watermark has to be embedded in the invariant transform domain to counteract the synchronization errors. Commonly used metrics to evaluate image quality are peaksignal-to-noise ratio (PSNR), weighted PSNR (wpsnr), and the Watson just noticeable difference (JND) [1], structural similarity index measure (SSIM). These metrics can help in achieving the tradeoff between the desired quality and the strength of watermark to be embedded. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. The watermarking scheme proposed in this paper is a non-blind watermarking scheme, since it requires the original image to extract the watermark image, is for copyright protection. This paper focuses on possible attacks against a image watermarking techniques, and work out an effective robust based on DCT- that must satisfy the requirements of watermarking scheme [2]. Watermark insertion is done by reordering the cover image and then applying the transforms. The watermark is embedded in the to the middle frequency bands of the DWT of an image. The proposed approach has the following advantages:1) The extracted watermark is visually recognizable to claim one s ownership; 2) The scheme has multiresolution characteristics; 3) The embedded watermark is hard to detect by human visual perceptivity; 4) The scheme is very robust against attacks. The transforms used are briefly described in section II. The proposed hybrid non-blind watermarking scheme is presented in the section III. The simulation results are illustrated in section IV, and the concluding remarks are drawn in section V. 2. BASICS OF TRANSFORMS USED FOR WATERMARKING 2.1 Discrete Cosine transform (DCT) DCT is used to linearly transform image to frequency domain. The energy of the image is concentrated in only a few low frequency components of DCT depending on the correlation in the data. 2.2 Discrete Wavelet Transform (DWT) DWT uses filters with different cutoff frequencies to analyze an image at different resolutions. The image is passed through a number of high-pass filters, also known as wavelet functions, to analyze the high frequencies and it is passed through a number of low-pass filters, also known as scaling functions, to analyze the low frequencies. After filtering, half of the samples can be eliminated according to the Nyquist criteria. This constitutes one level of decomposition. Thus, decomposition halves the time resolution (half the number of samples) and doubles the frequency resolution (half the span in the frequency band). The above procedure, also known as 12

the sub-band coding, is repeated for further decomposition in order to make a multiresolution analysis. 2.3 Singular Value decomposition (SVD) Singular Value Decomposition is an optimal for matrix decomposition. SVD is known for its stability, proportion invariance and rotation invariance properties. SVD is a general linear algebra technique which is used for packing the maximum signal energy into a few coefficients as possible. The SVD theorem decomposes a digital image A of size M N, as: =, (1) Where U and V are of size M M, and N N respectively. S is a diagonal matrix containing the singular values. In watermarking trial, SVD is applied to the image matrix; then watermark resides by altering singular values (SVs).The properties of SVD [2]. Fig. 2. Shows the zigzag reordering of the image 2. Apply Discrete Cosine transform (DCT) to the reordered cover image 3. Apply one-level Haar DWT to the DCT coefficients of the reordered image into four subbands. 4. Apply SVD to LH and HL subbands. A k =U k S k V kt k=1,2 (2) 5. Watermark is divided into two parts W=W 1 +W 2 where W k denotes half of the watermark. 6. Change the singular values in HL and LH subbands with half of the watermark image and then apply SVD to them, respectively, i.e.; S k +αw k = U w k S w k V w kt where α denotes the scale factor. The scaling factor. is for varying the strength of the watermark to be inserted. 7. Obtain the two sets of modified DWT coefficients. i.e., A *k = U k S w k V kt (4) 8. Perform the inverse DWT using two sets of modified DWT coefficients and two sets of non modified DWT coefficients. 9. Perform inverse DCT of the above obtained image 10. Obtain the watermarked image A w by reordering the image matrix in a zigzag manner. 3.1.2 Watermark Extraction (3) Fig. 1 shows the flowchart of watermark embedding process. 3. PROPOSED METHOD The main steps in the proposed hybrid for nonblind watermarking are summarized below. 3.1 Algorithm 3.1.1 Watermark Insertion 1. The cover image matrix is reordered in a zigzag manner. Fig.3 shows the flowchart of watermark extraction process. 13

1. The watermarked image I * W is reordered in a zigzag manner. Fig. 4. Shows the zigzag reordering of the image 2. Apply DCT to the reordered watermarked image and find the DCT coefficients. 3. Use one-level Haar DWT to decompose DCT coefficients into four subbands. 4. Apply SVD to the LH, HL subbands A *k W=U *k S *k WV *kt (5) 5. Compute B *k =U k W ( S* k W )V W kt, k=1,2 (6) 6. Extract each half of the watermark image from the LH and HL subbands. W *k =(B *k - S k ) /α,k=1,2 (7) 7. Add the results in step 6 to obtain the watermark image. W=W *1 +W *2 (8) Fig. 5.a) Shows the cover images used Lena, peppers and Barbara of size 256 x 256.b) Shows the watermark image used cameraman of size 128x128. c) Shows the watermarked images. Fig. 6.a)-c) Shows the extracted watermark after JPEG compression. d)-f) Shows the extracted watermark after noising attack. 4. SIMULATION RESULTS We have tested the proposed watermarking scheme on the popular gray scale test images Lena, Barbara, and Peppers of size 256 x 256 as our cover image and cameraman 128 x 128 as the watermark image. 4.1 Imperceptibility test: Imperceptibility property must be preserved by watermarking scheme. In order to compare the cover image and watermarked image peak signal to noise ratio (PSNR) is used. The comparison of the PSNR values obtained by implementing the proposed and [3] is shown in the table below. Table 1. Comparison of Peak Signal to Noise Ratio Cover image Lena 51.5564 50.2894 Peppers 51.7925 50.4406 Barbara 51.7341 50.9311 4.2 Robustness test: The robustness against various attacks is test. The attacks are performed on the watermarked image and watermark is extracted from this watermarked image using the extraction algorithm described in section III. Pearson s correlation coefficient is used to compare the correlation between the original watermark image and the extracted watermark images. 4.2.1 JPEG compression: This scheme can resist JPEG compression up to a quality factor of 30. Fig. 6(a) (c) illustrates the simulation results after JPEG compression. Table 2. Pearson s Correlation Coefficient Values of Watermark extracted from JPEG Compressed Compression factor 10 20 30 0.9844 0.9661 0.9515 0.9286 0.9192 0.8993 0.9318 0.9083 0.8799 0.8545 0.8487 0.8170 4.2.2 Noising Attack: The Gaussian noise is added to the watermarked image. The Fig. 6(d)-(f) shows the watermarks detected. Table 3. Pearson s Correlation Coefficient Values of Watermark extracted from Gaussian Noise added Mean Value 0.9998 0.9994 0.8 0.9998 0.9995 1.2 1.6 0.9994 0.9968 0.9992 0.9543 0.9957 0.9947 0.9786 0.9421 14

4.2.3 Signal Processing: The watermark can be detected after the watermarked image suffered common signal processing. Fig. 7(a)-(c) shows the simulation results for average filtering or blurring. Table 3. Pearson s Correlation Coefficient Values of Watermark extracted from Average Filtered Mean Value 0.9998 0.9994 0.8 0.9355 0.9120 1.2 1.6 0.9994 0.9968 0.9992 0.9543 0.9078 0.9001 0.8422 0.7912 4.2.4 Cropping: From the simulation results (given in Table 4), it can be seen that the proposed scheme is robust to cropping. As shown in Fig. 7(d)-(f), the watermarks can be detected even after the watermarked image suffer the cropping 50% off. Table 4. Pearson s Correlation Coefficient Values of Watermark extracted from Cropped Watermarked Image. Cropping ¼ columns 0.9920 0.9776 from left 0.8678 0.8316 ¼ rows from right ½ columns from left 0.9886 0.9533 0.9156 0.8979 0.8440 0.8316 0.8168 0.7846 4.2.5 Rotation: The simulation results given in Table 5 illustrate the fact that the proposed scheme is more robust to rotation than DWT- SVD scheme [3].Fig. 8(a)-(c) shows the simulation results for different angles of rotation. Table 5. Pearson s Correlation Coefficient Values of Watermark extracted from Cropped Watermarked Image. 45 0 0.9055 0.8376 0.9003 0.6691 Rotated By 60 0 0.9734 0.9319 90 0 0.9909 0.9778 0.9545 0.8556 0.9897 0.9144 4.2.6 Contrast adjustment: The simulation results in table 6 shows that this scheme is more resilient to contrast adjustment than scheme [3].Fig 8(d)-(f) shows the simulation results for contrast adjustment for different values. Table 6. Pearson s Correlation Coefficient Values of Watermark extracted from Contrast Adjusted Contrast Value 5 0.9989 0.9615 0.9811 0.9544 0.55 0.9892 0.9496 12 0.9506 0.8155 0.9535 0.9102 0.9301 0.8402 Fig. 7.a)-c) Shows the extracted watermark after average filtering attack. d)-f) Shows the extracted watermark after cropping attack. Fig. 8.a)-c) Shows the extracted watermark after Rotation Attack. d)-f) Shows the extracted watermark after Contrast Adjustment Attack. 5. CONCLUSION A novel hybrid watermarking scheme based on DCT-DWT- SVD is proposed in this paper. In this, the watermark is embedded very deep into the cover image since three transform (DCT, DWT, SVD) are taken before embedding the watermark which help in resilience the attacks. This can be used for copyright protection, tamper detection, fingerprinting, authentication and secure. The proposed scheme is robust to JPEG compression, noise adding attacks, contrast adjustment attack, cropping attack, rotation attack and other signal proceeding attacks. Better robustness is obtained at the expense of increased computation time. Experimental results are presented to claim the robustness and correctness of the proposed watermarking process. 6. REFERENCES [1] Q. Li, C. Yuan, and Y.-Z. Zhong, Adaptive Domain Image Watermarking Using Human Visual Model. In proceedings of 9 th International Conference on Advanced Communication Technology.Gangwon- Do,South Korea, pp. 1947-1951. [2] R. Liu and T. Tan, An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121 128, March 2002. [3] Chih-Chin Lai and Cheng-Chih Tsai. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transactions on instrumentation and measurement, Vol. 59.No. 11.2010. [4] F. Ahmed and I. S.Moskowitz. Correlation-based watermarking for Image Authentication 15

Applications. Opt. Engineering. Vol 43, No. 8,pp. 1833-1835.Aug 2004. [5] H.T. Wu and Y.M. Cheung, Reversible watermarking by modulation and security enhancement, IEEE transactions on Instrumentation and measurement, Vol.59, No.1, pp.221-228, Jan 2010. [6] V. Aslantas, L. A. Dog an, and S. Ozturk. based Image watermarking using particle swarm optimizer. In proceedings of IEEE International Conference on Multimedia Expo. Hannover, Germany, 2008,pp. 241-244. [7] S.G. Mallat, A Theory for Multiresolution signal decomposition: The wavelet representation, IEEE transactions on Pattern Analysis Machine Intell., Vol.11, no.7, pp.654-693, Jul.1989. [8] A. Nikolaidis and I. Pitas, Asymptotically optimal detection for additive watermarking in the DCT and DWT domains, IEEE transactions on Image Processing,Vol. 12,no. 5,pp.563-571,May 2003. [9] J.O Ruanaidh and T. Pun, Rotation, scale and translation invariant digital image watermarking, In Proceedings of ICIP 97, Vol.1, Santa Barbara, CA, Oct.1997, pp.536-539. 16