A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Similar documents
QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

QR Code Watermarking Algorithm based on Wavelet Transform

DIGITAL IMAGE WATERMARKING APPROACH BASED ON QR AND DWT METHOD

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Implementation of ContourLet Transform For Copyright Protection of Color Images

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Digital Watermarking with Copyright Authentication for Image Communication

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Robust DWT Based Technique for Digital Watermarking

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Adaptive Quantization for Video Compression in Frequency Domain

Robust Image Watermarking based on DCT-DWT- SVD Method

Data Hiding in Video

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

An Effective mechanism for Ensuring Security of QR Code

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Comparison of wavelet based watermarking techniques Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Robust Image Watermarking using DCT & Wavelet Packet Denoising

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A Robust Watermarking Algorithm For JPEG Images

Digital watermarking techniques for JPEG2000 scalable image coding

Efficient Image Steganography Using Integer Wavelet Transform

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques 1 Ji-Hong Chen and 1 Chin-Hsing Chen

A new robust watermarking scheme based on PDE decomposition *

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ROBUST INVISIBLE QR CODE IMAGE WATERMARKING IN DWT DOMAIN

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Digital Image Watermarking: An Overview

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Implementation of H.264/AVC Video Authentication System Using Watermark

Orientation Filtration to Wavelet Transform for Image Compression Application

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications

A DUAL WATERMARKING USING DWT, DCT, SVED AND IMAGE FUSION

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Watermarking Using DWT Based DCT Technique

Comparison of Digital Water Marking methods

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Denoising and Edge Detection Using Sobelmethod

Digital Watermarking: Combining DCT and DWT Techniques

Invisible Watermarking Using Eludician Distance and DWT Technique

A New Technique to Digital Image Watermarking Using DWT for Real Time Applications

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Data Protection in Cloud Computing Using QR Code

A New Approach to Compressed Image Steganography Using Wavelet Transform

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Data Hiding on Text Using Big-5 Code

A DWT Based Steganography Approach

Digital Image Watermarking Scheme Based on LWT and DCT

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

An Improved Blind Watermarking Scheme in Wavelet Domain

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions

Efficient Watermarking Technique using DWT, SVD, Rail Fence on Digital Images

A new wavelet based logo-watermarking scheme

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Wavelet Transform (WT) & JPEG-2000

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

Improved Qualitative Color Image Steganography Based on DWT

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

A QR Code Watermarking Approach based on the DWT-DCT Technique

Address for Correspondence

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A reversible data hiding based on adaptive prediction technique and histogram shifting

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Transcription:

www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7776-7782 A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya Abstract 1 (PG Scholar) Department of ECE, Chaitanya Institute Of Science and Technology, JNTU (K) Vizy.Ak47@Gmail.Com 2 Associate Professor, Department of ECE, Chaitanya Institute Of Science and Technology, JNTU (K) (srividyacist@gmail.com) 2 In the digital image processing copyright protection and authentication have become more significant, in order to achieve this digital different watermarking techniques are introduced for the security. We propose an algorithm in wavelet domain using wavelet transformation for a digital invisible watermarking is to embedded into a QR code image. In our method we embed a binary image logo considered as watermark embedded into one of selected wavelet subband. The experimental results show that our method has more robustness to attacks in different considerations and it can achieve a viable copyright protection and authentication. I.INTRODUCTION Now days Barcode becomes widely known because of their accuracy, and superior functionality characteristics. QR Code is a kind of 2D (two dimensional) Barcode symbol which is categorized in matrix code. It contains information in both the vertical and horizontal directions, whereas a 1D (one dimensional) Barcode symbol contains data in one direction only. QR Code holds a considerably greater volume of information than a 1D Barcode. QR Code developed by Denso Wave [1]. Bar codes are linear one-dimensional codes and can only hold up to 20 numerical digits, whereas QR codes are two-dimensional (2D) matrix barcodes that can hold 7,089 numeric characters and 4,296 alphanumeric characters, and 1,817 kanji characters of information [4]. In this paper, we describe a novel method to embed the QR code into still digital images. Most of the recent work in watermarking can be grouped into two categories: spatial domain methods, and frequency domain methods. Because frequency domain methods have better robustness than spatial domain, almost a11 techniques embed watermarks in the frequency domain, such as Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7776

DCT and DWT [2], [3]. To increase robustness against JPEG degradation of the watermarked image, we embed the watermark in low frequency domains of DWT. II.QR CODE A.QR code QR (Quick Response) Codes, are 2- dimensional bar codes that encode text strings and were introduced by the Japanese corporation Denso Wave Incorporated [6]. QR codes are considered as the evolution of the one dimensional barcodes. They are able to encode information in both vertical and horizontal direction, thus able to encode several times more information than the one dimensional barcodes. QR codes consist of black and white modules which represent the encoded data. B.QR Code structure Here we use as an example version 2, see Figure 1, which is the size that is most widely used, and based on [7], [8], [9], [10] analyze the structure of the QR Code. (1) Finder Pattern: The three identical structures that are located in the upper corners and in the bottom left corner enable the decoder software to recognize. the QR code and determine the correct orientation. These patterns also allow 360 degree (omni-directional) high-speed reading of the code. These structures consist of a 3 X 3 black square surrounded by white modules that are again surrounded by black modules. (2) Separators: The white separators that surround the Finder Patterns have width of one pixel and make it easier to distinguish the patterns. (3) Timing pattern: A sequence of black and white modules that help the decoder software to determine the width of a single module. (4) Alignment Pattern: This pattern allows the QR reader to correct for distortion when the code is bent or curved. The alignment pattern appears on version 2 and higher and the number of alignment patterns used depends on the version selected fro the encoding. (5) Format Information: This section consists of 15 bits and contains the error correction rate and the selected mask pattern of the QR code. The error correction level can be identified from the first two modules of the timing pattern (see figure LL HL LH HH LH HL HH (from [11]) Figure 1: Structure of QR Code Version 2 2.2). The format information is read first when the QR code is decoded. Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7777

(6) Data: After the data is converted into Reed- Solomon-encoded data bits, it is stored in 8 bit parts (codeword s) in the data section. (7) Error Correction: The data codeword s are used in order to generate the error correction (EC) codeword s, which are stored in the error correction section. (8) Remainder Bits: This section contains empty bits if the data or the error correction bits cannot be divided into 8 bit code words without a remainder. III. THE PROPOSED WATERMARKING PROCESS In this paper we can chose a watermark as binary image of any logo. In the frequency domain we perform the embedding process on QR code image using watermark. As shown in the figure we have to decompose the QR code image by two levels using two-dimensional wavelet transformation. To recover the embedded watermark we do not need the original QR code image subsequently LL2 LH2 HL2 HH2 LH1 HL1 HH1 In our algorithm have two steps: watermark embedding and watermark extraction. A. Watermark Embedding The following outlined procedure is for the embedding process (Fig.3) Step of watermark image with secret key i. The watermark image was produced as a bit sequence of watermark S. The data and background values were set to 1 and 1, respectively. S { } (1) where N is the total number of pixels in the watermark image. ii. The pseudo-random sequence (P) whose each number can take a value either 1 or 1 was randomly generated with a secret key for embedding and extracting of the watermark. P { } (2) Step of QR code image I. The two-level DWT of image ( ) was computed for QR code image. II. A watermark was then embedded in subband LH2 or HL2 or HH2. According to the rule: (3) where is input image. is output image with watermark. is a magnitude factor which is a constant determining the watermark strength. III. After that, the inverse DWT (IDWT) was then applied to obtain the watermarked image. IV. Compute PSNR. Fig 2. 2-level 2-dimensional WT Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7778

The prediction of the original value can be defined as: Fig. 3. Watermark Embedding Process B. Watermark Extraction The watermark extraction algorithm did not use the original QR code image. A prediction of the original value of the pixels is however needed. Thus, a prediction of the original value of the pixels was performed using elimination technique. In this paper, we use an averaging 3 3 mask whose elements were fixed to 1/9. The extraction processes are outlined as follows (Fig.4): I. The predicted image could be obtained by smoothing the input image with a spatial convolution mask. where c is the size of the convolution mask. The watermarked image and the predicted image were DWT transformed independently. II. The estimate of the watermark is indicated by the difference between as: (5) III. The sign of the difference between the predicted and the actual value is the value of the embedded bit: (6) IV. Compute NC The watermark was then estimated by multiplying pseudo- random number to the embedded bit. If an incorrect pseudo random sequence was to be used, the scheme would not work. Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7779

Fig. 4. Watermark Extracting Process IV.RESULTS Subb and PSNR NC Extracted watermark LH 43.0615 0.95 25 Gaussian 37.1402 0.9943 Noise (0.05) JPEG (40) 39.3897 0.9942 JPEG (50) 39.3897 0.9942 Figure 7 Watermark Extraction HL 43.1514 0.96 11 HH 44.2675 0.99 16 Table iii Attack Type PSNR NC Decode QR code Salt & Pepper 40.8837 0.9851 Noise (0.02) Salt & Pepper 38.4989 0.9687 Noise (0.05) Gaussian Noise (0.02) 37.2879 0.9945 Alpha 5 Alpha 10 Alpha 15 Alpha 20 Alpha 25 Alpha 30 Alpha 35 Alpha 40 Alpha 45 Table I PSNR and NC of QR code Image Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7780

α PSNR NC DECODE QR Code 5 47.1617 0.9826 10 44.1514 0.9934 15 42.3905 0.9961 20 41.1411 0.9967 25 40.1720 0.9975 30 39.3802 0.9980 35 38.7107 0.9986 40 38.1308 0.9991 45 37.6193 0.9995 Attack Type Salt & Pepper (0.02) Salt & Pepper (0.05) Gaussian (0.02) Gaussian (0.05) JPEG (40) JPEG (50) Attacked code image CONCLUSION: QR Extracted Watermark In this paper, we are proposing a water marking technique; here a binary or black and white image is embedded into QR code image by using Discrete Wavelet Transform technique. In DWT subband we select any one subband except LL subband i.e., LH, HL, HH to embed the watermark. And also extracting the watermark. These are results shown in simulation results. The objective measures such as PSNR and NC are subject to magnitude factor. And also found more efficient ways to withstand more severe attacks such as stronger, high compression, geometric distortion and occlusion etc. REFERENCES [1]. Denso wave incorporated, http://www.denso-wave.com/qrcode/indexe. html. [2] Lumini A and Maio D (2000) A wavelet-based image watermarking scheme In:Proc. Int.conf. Information Technology: Coding and Computing. pp.122-127. [3] Alattar AM(2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13: 1147-1156. [4] Jun-Chou Chuang, Yu-Chen Hu & Hsien-Ju Ko. A Novel Secret Sharing Technique Using QR Code, International Journal of Image Processing (IJIP), Volume (4) : Issue (5), pp. 468-475, 2010. [5] QR http://en.wikipedia.org/wiki/qr_code. Code, [6] DENSO Wave Incorporated. What is a QR Code?, 2013. http://www.qrcode. com/en/. Accessed 10 Feb 2013. [7] P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl. Qr code security. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, MoMM 10 (2010), pp. 430 435. Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7781

[8] Russ Cox. QArt Codes, 2012. http://research.swtch.com/qart. Accessed 05 Mar 2013. [9] Thonky.com. QR Code Tutorial, 2012. http://www.thonky.com/qr-code-tutorial/. Accessed 10 Feb 2013. [10] Esponse. Innovative QR Code campaigns (About QR codes), 2013. http://www.esponce.com/about-qr-codes. Accessed 23 Mar 2013. [11] P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl. Qr code security. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, MoMM 10 (2010), pp. 430 435. Alikani Vijaya Durga, IJECS Volume 3 Issue 8 August, 2014 Page No.7776-7782 Page 7782