CHAPTER-5 WATERMARKING OF COLOR IMAGES

Similar documents
CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Digital Watermarking with Copyright Authentication for Image Communication

Data Hiding in Video

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A new robust watermarking scheme based on PDE decomposition *

Combined Hashing/Watermarking Method for Image Authentication

Nios II Embedded Electronic Photo Album

Robust Image Watermarking based on DCT-DWT- SVD Method

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

CSE237A: Final Project Mid-Report Image Enhancement for portable platforms Rohit Sunkam Ramanujam Soha Dalal

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Robust Lossless Data Hiding. Outline

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Compression of Stereo Images using a Huffman-Zip Scheme

A New Psychovisual Threshold Technique in Image Processing Applications

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Introduction ti to JPEG

Image Authentication and Recovery Scheme Based on Watermarking Technique

Improved Qualitative Color Image Steganography Based on DWT

A New DCT based Color Video Watermarking using Luminance Component

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

QR Code Watermarking Algorithm based on Wavelet Transform

Image Error Concealment Based on Watermarking

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

DC Coefficients Based Watermarking Technique for color Images Using Singular Value Decomposition

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Robust Video Watermarking for MPEG Compression and DA-AD Conversion

Image and Video Watermarking

International Journal of Advance Research in Computer Science and Management Studies

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Copyright Detection System for Videos Using TIRI-DCT Algorithm

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

DEEP LEARNING OF COMPRESSED SENSING OPERATORS WITH STRUCTURAL SIMILARITY (SSIM) LOSS

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Watermarking Moble Phone Color Images With Error Correction Codes

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

A Digital Video Watermarking Algorithm Based on LSB and DCT

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

Stereo Image Compression

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

A New DCT Based Watermarking Method Using Luminance Component

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Comparison of wavelet based watermarking techniques Using SVD

Graphical Interface for Watermarking

Block Mean Value Based Image Perceptual Hashing for Content Identification

A Reversible Data Hiding Scheme for BTC- Compressed Images

MRT based Fixed Block size Transform Coding

Address for Correspondence

Tampering Detection in Compressed Digital Video Using Watermarking

Digital Watermarking: Combining DCT and DWT Techniques

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Implementation of ContourLet Transform For Copyright Protection of Color Images

Adaptive Quantization for Video Compression in Frequency Domain

A Robust Watermarking Algorithm For JPEG Images

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

WAVELET AND DISCRETE COSINE TRANSFORMS FOR INSERTING INFORMATION INTO BMP IMAGES

DIGITAL IMAGE WATERMARKING

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Sign-up Sheet posted outside of my office HFH 1121

COLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT)

Lecture 5: Compression I. This Week s Schedule

Reversible Data Hiding VIA Optimal Code for Image

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Speech Modulation for Image Watermarking

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

Robust DWT Based Technique for Digital Watermarking

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

CHAPTER 3 FACE DETECTION AND PRE-PROCESSING

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

Improved Content Based Image Watermarking

Implementation of Audio Watermarking Using Wavelet Families

Transcription:

CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images. The proposed ICAR watermarking scheme given in the previous chapter was chosen as a base as it has already proved its resistance to JPEG compression attack and other common image manipulations and performed at par with other state-of-the-art watermarking schemes. In this chapter, we conducted a study to find out the suitability of color channel (Red/Green/Blue) to hide the watermark data while using the DCT based watermarking scheme. We present an ICAR watermarking schemes for true colored BMP images. 5.2 PERFORMANCE ANALYSIS OF COLOR CHANNEL FOR DCT BASED IMAGE WATERMARKING SCHEME Initially, the suitability of color channel to hide a monochromatic watermark in a 24-bit color Window s BMP image while using classical MBCE watermarking scheme, was examined as MBCE scheme is the base scheme used to develop the proposed ICAR watermarking schemes. Four well known 24 bit colored test images of Lena, Pepper, Mandrill and Monarch (Size 512 x 512 pixels), shown in Figure 3.12 were taken. The watermark logo used is shown in Figure 3.13. Then, the watermark logo was embedded in these 4 test images using the MBCE watermarking scheme. To analyze the performance of Red, Green and Blue channels, the watermark was embedded separately in R, G and B channels one by one. So, total 4 images were watermarked and each of these images ware watermarked thrice. 81

Table 5.1: PSNR of Extracted watermark from JPEG compressed watermark test images LENA.BMP PEPPER.BMP JPEG Compression Q = 20 Q = 40 Q = 60 Q = 80 Q = 20 Q = 40 Q = 60 Q = 80 RED 3.8138 5.86586 9.38713 13.737 4.44446 6.12934 11.3841 14.9055 GREEN 6.2285 10.8642 14.1634 17.8173 6.48408 10.3018 13.9941 15.7327 BLUE 3.78458 4.45904 7.00983 14.0586 4.0144 4.59762 7.27842 13.686 MANDRILL.BMP MONARCH.BMP JPEG Compression Q = 20 Q = 40 Q = 60 Q = 80 Q = 20 Q = 40 Q = 60 Q = 80 RED 4.58561 6.09133 13.5342 17.9727 4.18767 6.06572 10.7443 15.4762 GREEN 7.3024 14.3188 18.4186 20.1702 4.88113 10.393 13.274 16.1883 BLUE 4.00899 4.72608 11.0469 17.8341 3.78916 4.38603 7.24002 13.9242 RED (PSNR-5.86) GREEN(PSNR -10.86) BLUE(PSNR -4.45) Figure 5.1: Recovered watermarks for Lena.bmp after jpeg attack at Q = 40 After watermarking the test images in all three color channels, we compressed all 12 watermarked images using JPEG compression at 4 JPEG quality factors (Q = 80, 60, 40, and 20) and then recovered the watermark logos from JPEG compressed images. We calculated the PSNR values of all these 12 x 4 = 48 extracted watermark logos. Table 5.1 summarizes their PSNR values. The recovered watermark logos from all 3 Lena s test images, if they were JPEG compressed at Q = 40, are shown in Figure 5.1. It was observed that for all test images, quality of extracted watermark logo was better, if watermark is embedded in GREEN channel for all JPEG quality factors. This can be justified as follows: JPEG uses the YCbCr color model. While converting from BMP to JPEG, following color transformation occurs: Y = 0.299 x R +0.587 x G + 0.114 x B Cb = 128-0.168 x R - 0.331 x G + 0.500 x B --------- (5.1) Cr = 128 + 0.500 x R - 0.419 x G - 0.081 x B 82

Where Y' is the luminance component and Cb and Cr are the blue and red chrominance components. Y'CbCr is not an absolute color space. It is a way of encoding RGB information and the actual color displayed depends on the actual RGB colorants used to display the signal. It is clear from Equations 5.1 that G is multiplied by relatively larger coefficient and thus green channel should carry the watermark data for the better recovery if images are JPEG compressed after the watermarking using the MBCE scheme. Now to further validate the concept of preprocessing introduced in previous chapter, color channels of all test images were histogram equalized one at a time, i.e., Lena image had now 3 copies where in one copy only red channel is equalized, in another copy only green channel is equalized and in the third copy only blue channel is equalized leading to 12 test images to be watermarked. The watermark logo was embedded in the histogram equalized color channel for all 12 test images. We performed the following attacks on the watermarked images: 1) JPEG Attack (low JPEG compression with Q = 20); 2) Noise Attack (adding 10% Gaussian noise in the watermarked images); and 3) Histogram Equalization (equalizing the histogram of the watermarked images). The watermark logos were recovered from the attacked images and their PSNR values were calculated. Table 5.2 summarizes the PSNR values of watermark logos recovered. It may be observed from Table 5.2 that for all cases if a color channel of the image was HISTOGRAM EQUALIZED before embedding the watermark, recovery of watermark is better i.e. PSNR values are higher. Therefore, our proposed idea of preprocessing worked well for colored BMP images also. It may be further observed that the difference in the PSNR values of recovered logos from original image and equalized image are high in the case of histogram equalization attack because our preprocessing step is itself the histogram equalization. These results further prove that a modification in the image such that the effect after the attack on the watermarked image could be minimized, increases the robustness against that attack for colored images watermarking algorithm. 83

It is, therefore, concluded that to decide the color channel to carry the watermark data, we will have to analyze the characteristics of attack itself. If there is high probability that watermark image may undergo JPEG compression, we should select the GREEN channel because while converting to JPEG format, green channel s data has higher impact as compared to other color channel s data. Color Channel Table 5.2: PSNR of extracted watermark from attacked watermarked test images LENA.BMP PEPPER.BMP Attack Jpeg Q20 Histogram Equalizati on Noise (12.5%) Jpeg Q20 Histogram Equalizati on Noise (12.5%) Original 3.85853 15.5867 4.9277 3.89485 17.4944 6.87319 RED Equalized 4.7334 15.6074 5.13784 4.706 19.4657 7.05068 Original 6.2285 15.7285 5.25512 4.50915 14.7932 6.72312 GREEN Equalized 6.8358 18.7032 5.37656 6.9542 16.9559 7.69791 Original 3.78205 16.8769 4.96932 3.70676 15.503 6.7605 BLUE Equalized 4.1447 23.0387 5.41004 4.1985 18.6343 8.12838 MANDRILL.BMP MONARCH.BMP Color Channel Attack Jpeg Q20 Histogram Equalizati on Noise (12.5%) Jpeg Q20 Histogram Equalizati on Noise (12.5%) Original 4.58561 17.1942 8.9886 4.18767 16.9726 7.712 RED Equalized 5.2266 16.7228 9.36638 4.7169 18.1131 7.86498 Original 7.3024 17.4885 9.2963 4.88113 16.3554 7.65961 GREEN Equalized 11.1118 21.6698 9.81065 6.9542 21.0406 8.14772 Original 4.00899 16.7143 8.75787 3.78916 14.483 7.48674 BLUE Equalized 4.3586 18.3073 8.86063 4.3045 20.213 8.39899 84

It is also clear from Table 5.2 that for attacks other than JPEG Compression, performance of color channels for all images had no fixed pattern which means that robustness may depend upon the attack characteristics as well as image characteristics also. Therefore, the goal for the further development was not only to develop an ICAR watermarking scheme but also to find out some relationship between the performances of our proposed schemes with the image characteristics itself. 5.3 DEVISING AN ICAR WATERMARKING SCHEME FOR COLORED BMP IMAGES In the previous chapter, we have proposed an ICAR scheme for watermarking gray level image. Results indicated that this scheme was not only an ICAR scheme but also very robust to JPEG compression attack and other common image manipulations. Therefore, we decided to extend the same approach for colored BMP images also. In the earlier proposed ICAR scheme, we have introduced redundancy in swapping and made the swapping criterion dependent on low frequency coefficient. To further improve the robustness, we propose a new swapping criterion with the assurance that no two watermarked copies of an image have same policy of watermarking. An attacker may attack on large number of middle band coefficients but if image has to remain perceptually unchanged, the average value (Av) of all middle band coefficients (total 22 in numbers) will not modify to a great extent. So, unlike the previous scheme where we swapped 4 pairs, we swapped 4 middle band coefficients (not pair) with the Av value. Details of this swapping mechanism are described in Section 5.3.3. The proposed watermarking scheme can be defined as a 7-tuple (X, W, P, T, G, E, D) where: 1) X denotes the set of instances X i of a particular gray level image, (If N copies of an image are to be watermarked, then 0 i N); 2) W denotes the monochrome watermark logo; 3) P denotes the set of policies P i, 0 i N; 85

4) T is the watermark strength parameter ; 5) G denotes the policy generator algorithm G: X i P i, where each X i will have a unique P i, i.e. a different policy to hide the watermark data. 6) E denotes the watermark embedding algorithm, E: X i x W x Pi X i ; 7) D denotes the watermark detection algorithm, D: X i x P i W, where W represents extracted watermark. The parameter T is analogous to K of classical MBCE scheme. In classical MBCE scheme, relative strength of 2 coefficient s value of FM region decides the decoding of 1 or 0. If the relative strength of 2 values has to decide the decoding of 0 or 1, then larger value should remain larger even after image manipulations. So, we adjust these values in such a way that the difference between the 2 values becomes larger than a certain threshold value. We name this threshold value as Watermark Strength Parameter because this value decides the robustness of watermark data. Certainly, it has an impact on the image perceptibly. So, we have to decide this threshold value in such a way that our image does not loose its quality much. Out of these 7 tuples, last 3 tuples are algorithms which are discussed below: 5.3.1 G, THE POLICY GENERATOR ALGORITHM Similar to our earlier proposed ICAR watermarking scheme for the gray image watermarking, we had to watermark each copy X i of an image X differently. Therefore, we need a different watermarking policy for each copy of the image to be watermarked. Here Policy means that for every copy of the image, there will be unique combination of 4 middle band coefficients. To generate a policy, we simply take 8 x 8 DCT of the input image Xi and randomly select 4 coefficients out of 22 middle band coefficient of FM region from any of the red, green or blue color channel. So, numbers of policies that can be generated are 22 C 4 = 7315 which means that 7315 copies of a single image can be watermarked such that no two watermarked images have same policy. This step ensures that attacker can not conclude the location of watermark data by colluding many 86

watermarked copies of an image. This also depicts that our proposed scheme is an ICAR scheme. 5.3.2 COLOR CHANNEL SELECTION Up to the development of this approach, we used only BLUE color channel to hide the watermark data. Bossen et al. [9] have stated that the watermarks should be embedded mainly in the BLUE color channel of an image. The human eye is least sensitive to change in BLUE channel. However, the suitability of color channel to hide the watermark data is dependent on the image itself and therefore, we have discussed some interesting results related to this issue in the Chapter 6. In this section, we are using BLUE channel to hide the watermark data. 5.3.3 E, THE WATERMARK EMBEDDING ALGORITHM In this algorithm, each 8x8 DCT block of an image is used to hide a single bit of watermark logo. Our embedding algorithm is based on averaging the coefficients of FM region. We can fight against collusion attack by swapping more than one pair but if attacker is ready to loose some quality, he/she can disturb all the coefficients in FM region. Therefore, even if we introduce redundancy with randomness, our watermark data may still be attacked. So, we propose that an attacker cannot alter the image such that the average of coefficients of FM region changes much. Accordingly, we are hiding 1 or 0 by using relative value of a coefficients and the average Av of coefficients of FM region. This algorithm is given as below: 1. Repeat steps 2 to 11 for i = 1..n; // where n is the number of copies of a single image to be watermarked // 2. INPUT (X i ); 3. Take 8x8 block DCT of X i ; 4. INPUT (W); 5. Convert W into a string S = (S j S j = {0,1}, for j = 1..length of the watermark); 87

6. Let L = STRING_LENGTH (S); // L is the length of watermark data. If L = 1000, then first 1000 DCT block of Xi are used // 7. P i = CALL (G); // Each generated Pi shall be stored in an author s database for the detection purpose in future. Let the Pi for chosen Xi be, Pi = {(5,1), (4,2), (6,3) and (5,4)} in BLUE channel // 8. Calculate the average Av of remaining 18 middle band coefficients. 9. Repeat steps 10 to11 for r = 1..L; 10. Read Sr; // Now like classical MBCE scheme, relative strength of average Av and chosen 4 coefficients in step 7 will interpret 0 or 1 of watermark data. To hide 0, for all 4 chosen coefficients in step 7, we assigned the value of coefficients which is T less than the average Av. To hide 1, for all 4 chosen coefficients in step 7, we assigned the value of coefficients which is T greater than the average Av // If (S r = 0) DCT (5, 1) = Av - T; DCT (4, 2) = Av - T; DCT (5, 4) = Av - T; DCT (6, 3) = Av - T; Else DCT (5, 1) = Av + T; DCT (4, 2) = Av + T; DCT (5, 4) = Av + T; DCT (6, 3) = Av + T; End; 11. Take IDCT to reconstruct X i ; 12. End. 5.3.4 D, THE WATERMARK DETECTION ALGORITHM Watermark extraction is the reverse procedure of watermark embedding. To extract the watermark from the watermarked image, we calculated the average Av in the same way as in embedding algorithm. Owner should have a record of all policies used to watermark 88

the image. Based on policies, owner of the image can recover watermark using following rules: 1) If at least 1 out of 4 chosen coefficients are less than average, Interpret 0 ; and 2) If at least 1 out of 4 chosen coefficients are greater than average, interpret 1. The detection algorithm steps are as follows: 1. INPUT (X i ); // Xi is the attacked copy of a watermarked image // 2. Take 8x8 block DCT of X i and calculate Av; 3. For all P i in author s database, repeat the steps 4; // If initially 10 copies were watermarked, then out of 10 policies, for 1 policy, watermark will be recovered correctly. To explain further steps, we are assuming that now algorithm is in a loop where Pi is {(5,1) (4,2) (5,4) and ( 6,3)}, which was used to watermarked this particular Xi // 4. Repeat the steps 5 for j = 1.L; // L is the length of watermark data. A single bit will be recovered form one 8x8 DCT block// 5. Take j th DCT block to form j th bit of watermark as follows: If (DCT (5, 1) <= Av) T1 = 1; Else T1 = 0; If (DCT (4, 2) <= Av) T2 = 1; Else T2 = 0; If (DCT (5, 4) <= Av) T3 = 1; Else T3 = 0; If (DCT (6, 3) <= Av) T4 = 1; Else T4 = 0; If ( T1 + T2 + T3 + T4 >= 1) 89

Decode 0 If (DCT (5, 1) > Av) P1 = 1; Else P1 = 0; If (DCT (4, 2) > Av) P2 = 1; Else P2 = 0; If (DCT (5, 4) > Av) P3 = 1; Else P3 = 0; If (DCT (6, 3) > Av) P4 = 1; Else P4 = 0; If ( P1 + P2 + P3 + P4 >= 1) Decode 1 End; 6. Store W, the recovered watermark; 7. End. It may be observed from both the algorithms that even if attacker alters the values of the coefficient of FM region, if Av is not changed much, then we can recover the watermark data correctly and attacker cannot aim to attack the image in such a manner which modifies Av. 5.3.5 PERFORMANCE OF THE PROPOSED SCHEME Our proposed scheme does not need any testing to check whether or not it is robust against the collusion attack, as it is designed in such a way that the attacker can not analyze the pattern by colluding many watermarked copies. We needed to check the performance of the proposed scheme against the JPEG compression and other common image manipulations and known attacks. For this, we tested our scheme on 3 test images 90

Lena, Mandrill and Pepper of size 512 x 512 in Windows 24 bit BMP format, shown in Figure 3.12. Firstly, we chose an appropriate value of T which affects least the image quality as well as optimizes the recovery of watermark data. Our experiments suggested that if we were hiding the watermark using T = 150, there was approximately no loss in the perceptual quality of the images and recovered watermark logos were of very fine quality. Figure 5.2 shows the watermarked test images after hiding watermark logo by keeping T = 150. It may be seen that, images are not disturbed at all. Figure 5.3 shows the extracted watermark logos from these watermarked copies of Lena, Mandrill and Pepper without performing any attack or manipulations on the watermarked images. This fixed up the value of T = 150 for further tests. Figure 5.2: Watermarked test images keeping T = 150 Figure 5.3: Extracted watermark from watermarked Lena, Mandrill and Pepper images respectively at T = 150 5.3.5.1 PERFORMANCE AGAINST JPEG COMPRESSION: We applied JPEG compression on watermarked images (generated by keeping T = 150) at different JPEG quality parameters Q and then recovered the watermark logos. Table 5.3 summarizes the 91

PSNR of extracted watermark logos. It may be observed from Table 5.3 that even at Q = 20, quality of extracted watermark is very fine and logos are quite detectible. 5.3.5.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS: We performed the following attacks on the watermarked test images: Attack-1: Equalize the Histogram; Attack-2: Apply uniform scaling (Zoom); Attack-3: Adjust the brightness to +40 and contrast to +25; Attack-4: Adjust the hue and saturation to +10 each; Attack-5: Add 10 % Gaussian noise; and Attack-6: Blur the image using Gaussian blur with 1 pixel radius. Table 5.3: PSNR of extracted watermark logos after JPEG compression PSNR (DB) Quality factor Lena Watermarked with T = 150 Mandrill Watermarked with T = 150 Pepper Watermarked with T = 150 Q = 80 39.9987 37.0185 39.9987 Q = 60 39.9987 34.98135 39.9987 Q = 40 24.57225 14.51025 25.20285 Q = 20 21.92385 12.26715 21.3678 Then, we recovered the watermark logos from attacked images and calculated the PSNR value of watermark logos. Table 5.4 summarizes the PSNR values of extracted logos recovered from all test images. Our proposed scheme sustained all the attacks and the quality of the extracted watermark logos is quite good. Figure 5.4 shows the recovered logos from attacked images. 92

Table 5.4: PSNR of extracted watermark logo from watermarked test images after attacks PSNR (DB) Histogram Equalization Zoom Brightness- Contrast Adjustment Hue- Saturation Gaussian Noise Gaussian Blur Lena 34.67 34.67 34.67 34.67 34.67 34.67 Mandrill 28.06 28.04 28.04 28.04 28.04 28.04 Pepper 32.25 32.07 30.78 32.48 31.78 31.10 5.3.5.3 COMPARATIVE STUDY RESULTS WITH OTHER SCHEMES: We compared our scheme against JPEG compression with other similar and state-of-the-art methodologies which are well known for their robustness against JPEG compressions. The chosen schemes are as follows: Scheme-A: Correlation based Schemes with 2 PN sequence (Section 2.1.3.2) Scheme-B: Classical MBCE Scheme (Section 2.2.2.1) Scheme-C: Scheme proposed in Section 4.4 is also based on Middle Band Coefficient Exchange (MBCE) scheme and ICAR in nature. So, we decided to compare the performance of our scheme with this scheme also. This scheme swaps 4 pairs of coefficients in FM region in correlation with low band coefficients. We are naming this scheme as Scheme-C. Then, we re-implemented the chosen schemes for the colored images and hid the watermark data in BLUE channel. Scheme-D: We are naming our proposed scheme as Scheme-D. It is observed that all the above schemes are robust against JPEG compression attack but if we compress the watermark images by very low quality factors (less then Q = 20), our proposed scheme outperforms the other schemes. We compressed the watermarked test 93

images by keeping JPEG quality factor Q = 15, 10, and 5. No scheme, other than the proposed one, was able to extract the detectible watermark logos. Figure 5.4: Recovered logos from attacked images Table 5.5 summarizes the PSNR values of extracted logos from highly compressed watermark test images using various schemes. Figure 5.5 shows the recovered watermark logos from highly compressed watermarked images using our proposed scheme. It may be observed that recovered logos are quite detectible and proposed scheme is more efficient than the other chosen schemes. 94

Table 5.5: PSNR values of extracted logos from highly compressed watermarked test images using various schemes PSNR (DB) JPEG Quality Lena Mandrill Pepper Factors Schemes Scheme-A Scheme-B Scheme-C Scheme-D Q = 15 8.723 7.89 8.12 Q = 10 7.67 7.12 7.988 Q = 05 4.5 4.324 4.657 Q = 15 4.222 4.587 3.987 Q = 10 3.45 3.87 3.95 Q = 05 2.32 2.2 1.97 Q = 15 4.323 4.565 4.33 Q = 10 4.11 4.249 4.12 Q = 05 2.234 2.229 2.1 Q = 15 16.305 10.845 13.335 Q = 10 15.585 10.62 12.885 Q = 05 14.13 10.29 11.4 Test Images / JPEG Q Factor Lena Mandrill Pepper Q = 15 Q = 10 Q = 05 Figure 5.5: Extracted logos using proposed scheme from highly compressed watermarked test images 95

Results indicate that proposed scheme recovers the watermark even from an attacked image which is compressed up to Q = 5 quality factor of JPEG (i.e. after 95-99% size reduction). This proves that the proposed scheme is not only an ICAR scheme but also very robust to JPEG compression. In addition to this, the proposed scheme is resisting common image manipulations like cropping, scaling, flipping, histogram equalization, brightnesscontrast adjustment, Hue-saturation alteration, Gaussian noise and Gaussian blur. 5.4 CONCLUSION In this chapter, we have discussed the watermarking of the colored images. Since a colored image has R, G and B color channel, firstly we presented a study to find the suitability of a color channel to carry the watermark data with respect to the robustness against an attack. It was found that if an image has to undergo JPEG compression attack, then the watermark data should be hidden in GREEN color channel to ensure the best recovery of the watermark logo. Then, we presented an ICAR watermarking scheme based on the average of the FM coefficients. Results indicted that the proposed scheme is very robust against JPEG compression and common image manipulations and better then other similar state-of-the-art schemes. 96