Digital Watermarking Using 2-DCT

Similar documents
Robust Image Watermarking based on DCT-DWT- SVD Method

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Speech Modulation for Image Watermarking

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Digital Watermarking with Copyright Authentication for Image Communication

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Digital Image Watermarking: An Overview

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Digital Image Steganography Techniques: Case Study. Karnataka, India.

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

A New Approach to Compressed Image Steganography Using Wavelet Transform

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Digital Image Watermarking Using DWT Based DCT Technique

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

QR Code Watermarking Algorithm based on Wavelet Transform

A new robust watermarking scheme based on PDE decomposition *

A Robust Watermarking Algorithm For JPEG Images

Implementation of Audio Watermarking Using Wavelet Families

A Digital Video Watermarking Algorithm Based on LSB and DCT

Implementation of Audio Watermarking Using Wavelet Families

Digital Image Watermarking Scheme Based on LWT and DCT

Image Error Concealment Based on Watermarking

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

A Robust Image Watermarking Scheme using Image Moment Normalization

Efficient Image Steganography Using Integer Wavelet Transform

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

An Improved Performance of Watermarking In DWT Domain Using SVD

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Robust DWT Based Technique for Digital Watermarking

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Image Steganography Method Using Integer Wavelet Transform

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Implementation and Comparison of Watermarking Algorithms using DWT

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

A New hybrid method in watermarking using DCT and AES

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Digital Watermarking: Combining DCT and DWT Techniques

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

Enhancing the Image Compression Rate Using Steganography

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

Multiple Binary Images Watermarking in Spatial and Frequency Domains

A New DCT Based Watermarking Method Using Luminance Component

Improved Qualitative Color Image Steganography Based on DWT

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

Invisible Watermarking Using Eludician Distance and DWT Technique

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

International Journal of Advance Research in Computer Science and Management Studies

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

A Robust Technique For Digital Watermarking using 3-DWT- SVD and Pattern Recognition Neural Network

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

A blind watermarking algorithm based on DWT-DCT using gold sequence generator

Overview Of Techniques Of Stegnography On Various Media

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Image and Video Watermarking

DCT-Based Image Feature Extraction and Its Application in Image Self-Recovery and Image Watermarking

DWT-SVD based Multiple Watermarking Techniques

FRAGILE WATERMARKING USING SUBBAND CODING

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

Robust Image Watermarking using DCT & Wavelet Packet Denoising

A New Spatial q-log Domain for Image Watermarking

A Robust Image Hiding Method Using Wavelet Technique *

Keywords PSNR, NCC, DCT, DWT, HAAR

Comparison of wavelet based watermarking techniques Using SVD

Transcription:

Digital Watermarking Using 2-DCT Trapti Singh, NamitaArya University School of Information and Communication Technology, Guru Gobind Singh Indraprastha University, Dwarka, New Delhi, India traptisingh23@gmail.com, aryanamita12@gmail.com Abstract: Digital Watermarking is the process of hiding a message into the digital file like image, audio, video, etc. for the protection and authentication of the content. Sometimes it is related with steganography, as both are used for hiding the message but difference is that in steganography there is no relation between digital file and message, it is only used to hide the message existence, on the other hand with watermarking one hides a message related to the digital content. Digital Watermarking consist of several characteristics like Invisibility, Robustness, Readability and Security from any unauthorized user. Keywords:Digital Watermarking, PSNR,Watermarking Attacks I. INTRODUCTION In this paper discrete Cosine transform is used for insertion and extraction of watermark in original image. We will divide the image into blocks and watermark is added into the first bit of each block. This DCT technique is much simpler and robust than others. Just like Discrete Fourier transform, DCTalso transforms a signal or image from the spatial domain to the frequency domain. DCT helps in separating the image into spectral sub-bands having different visual quality. Mohamed A. Suhail et al.[1] developed a watermarking algorithm based on discrete cosine transform and image segmentation. In this, a image is segmented into different portions based on the voronoi diagram and features extraction points. After, in the DCT domain of each image segment, a pseudorandom sequence of real numbers is added. Soumitra Roy et al.[2] proposed a color multiple watermarking based on DCT and repetition code. In this, different watermark embedding is done over green and blue component, zigzag scanning of each DCT block is done to ensure watermarked host image imperceptibility. Rajput, Tiwari [4] generated digital watermarking using 2-DWT and 2-DCT by extracting RGB elements and applying for more quality and security. In this research, they have used red component for embedding of secret image into the original image. In this, low frequency component is achieved by applying 2-level DWT over the frequency component of the original image. Then Inverse 2-level Inverse DCT is applied to form resultant secret image. Later the 2-level DCT is applied over the RGB elements. For calculating PSNR value, blurred attack is done over the image. Priyanka, Maheshkar [3] noted that most of the visual part that is important reside in the low frequency sub band. Two images are taken i.e a cover image and a binary watermark, then cover is divided into non overlapping blocks and then block wise DCT is applied. Middle frequency sub-band of DCT block is used for watermark embedding for reducing loss during compression process and to reduce quality degradation. Yu Yang et al [] proposed technique based on DWT and DCT in which a Zero-Watermark is embedded by comparing adjacent frames mean absolute values coefficients and DWT-DCT applied on the host signal frames. The proposed algorithm is aslo robust to common signal processing operations. S. Fazli, M. Moeini [10] proposed method that has a high capacity to embed large sequences and will be robust against various attacks. They suggested that the watermark can be embedded separately into the four different sub-images of the host image so that cropping attack can be resisted. The proposed scheme is based on DWT, DCT and SVD domains in which middle frequency components is used to balance between imperceptibility and robustness. Shabir A. Parah et al[11] proposed technique based on block based DCT coefficient modification. In this paper, difference between two DCT coefficients of adjacent blocks is calculated, and then difference is brought between particular ranges by modifying one of the DCT coefficients. Types of Digital Watermarking Digital image watermarking is classified into two types: 1. Spatial-domain method 2. Frequency-domain method DOI: 10.2117/ijet/2017/v9i3/170903S004 Vol 9 No 3S July 2017 21

1. Spatial Domain Method Spatial Domain Method directly transforms the raw data into the original image. It can also implemented by using color separation so that watermark will appear in one of the color bands which will be difficult to detect by naked eye. But it can be made visible during printing by separating colors. This technique basically changes the image representation of object to enhance image for different kind of applications. This approach is mostly used by the journalists for inspecting the digital pictures. Spatial domain consists of following algorithms: 1.1 SSM Modulation Based Technique Spectral Spectrum techniques generate energy over discrete frequencies which is distributed at time. This modulation technique helps in increasing robustness against natural interference, jamming and watermark detection, establish a secure communication. When SSM based watermarking is applied to the image, it embed the information by linearly combining the image with the embedded watermark modulated small noise signal. 1.2 Least Significant Bit(LSB) In this technique, watermark is embedded in the LSB of the pixels. As we know pixel is represented by -bit sequence, we embed the watermark into the least significant bit in the selected pixels of the image. It is easier to implement and doesn t cause any major distortion in the image but it is not used commonly as it is not robust against different kind of attacks. II. FREQUENCY DOMAIN TECHNIQUES Frequency-domain methods are most widely used as compared to spatial-domain methods. This technique aims to embed the watermarks in the spectral coefficients of the image. Discrete Cosine Transform(DCT),Discrete Wavelet Transform(DWT),Discrete Fourier Transform(DFT) are most commonly used transforms under this technique. Frequency Domain method use the property that Human Visual system (HVS) are better captured by the spectral coefficients. For example, HVS is less sensitive to the high frequency and more sensitive to low frequency coefficients. Hence, alterations to the low frequency components may cause distortion to the original image and high frequency coefficients are considered insignificant, hence processing techniques, such as image compression and watermarking tend to remove high frequency coefficients. Due to this reason, most of the algorithms embed watermarks in the midrange frequencies to maintain the balance between robustness and imperceptibility. 1.3 Discrete Cosine Transformation (DCT) Just like Fourier transform, DCT represents data in terms of frequency space instead of amplitude space.this technique is more robust to image processing operations like blurring, brightness, low pass filtering,etc as compared to spatial domain techniques but it sweak against geometric attacks like scaling, rotation, cropping etc. However, these are difficult to implement and computationally more expensive. It embeds the watermark into significant portion of the image as most of the compression schemes remove the insignificant portion of the image. It can be classified into two type s i.e Global DCT watermarking and Block based DCT watermarking. 2.2 Discrete Wavelet Transformation (DWT) The Discrete Wavelet Transform decomposes the image into sub-image of different spatial domain and independent frequencies. It is used in different kind of signal processing applications, such as removing noise in audio, audio and video compression, etc. Wavelets consist of their energy concentrated in time and are very well suited for analysis of transient, time-varying signals. One of the major challenge watermarking faces is to balance between perceptivity and robustness. If we increase the strength of the embedded watermark, robustness increases but it may increase visible distortion. However, DWT is preferred as it provides both spatial localization and a frequency spread of the watermark within the given image [6]. III. METHOD: Most of the lossy compression uses transform compression like JPEG (Joint Photographers Experts Group) for the image encoding. Lossy Compression involves sampling and/or quantization by reducing number of bits per sample or ignoring some of the samples as a result the size of data file may reduce. The DCT uses cosine waves to present a signal unlike Fourier transform which uses both sine and cosine waves. DCT is taken in * group form which results in an * spectrum. As DCT is designed to work over the pixel values of range -12 to 127.After quantization, the low frequencies are present in the upper-left corner of the spectrum and high frequencies reside in the lower right. Later, the remaining coefficients will only be considered for reconstructed image. DOI: 10.2117/ijet/2017/v9i3/170903S004 Vol 9 No 3S July 2017 22

Input Pixel Matrix Output DCT Matrix 144 144 152 152 155 14 162 147 167 14 155 147 167 162 14 196-1 21-34 -10-24 - -5-3 10 4-2 9 1 0-9 167 14 136 14 15 26-2 147 175 14 147 163 136 162 136 147 155 150 136 147 136 152 155 155 146 136-24 -9-11 6-1 14-15 -3-1 -3-2 1 4 2-11 -1 1 Watermark Embedding using DCT: Algorithm for watermark embedding: Step 1. Read the input image and convert it into gray scale format. Step 2. Read the watermark image and convert it into binary format. Step 3. Compute the 2-D DCT coefficients of the input image. Step 4. Divide the input image into * blocks and Insert the watermark into the first bit every block. Step 5. Recombine the blocks into image and compute inverse DCT. Step 6. Display the Watermarked image. Watermark Extraction using DCT: Algorithm for watermark extraction : Step 1. Read the watermarked image. Step 2. Compute the 2-D DCT Coefficients of the image. Step 3. Divide the image into * blocks and extract the watermark from first bit of the block. Step 4. Apply DCT and recombine the blocks into image. Step 5. Display the extracted watermark. Experiment Results -9 11 3-1 -4-7 4 179 155 167 179 152 172 162 156 162 155 155 162 136 162 123 166-14 19 14-20 -1-3 1 15 1-7 -1-2 -6 0 Fig. Watermark Image Fig. Input Image DOI: 10.2117/ijet/2017/v9i3/170903S004 Vol 9 No 3S July 2017 23

Fig.Extracted Watermark IV. CALCULATING PSNR: The PSNR(Peak to noise ratio) ratio is used measure quality between compressed and original image, higher the ratio better the quality of reconstructed image.it is measured in decibels. The Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR) are the two error metrics used to compare image compression quality. The MSE represents the cumulative squared error between the compressed and the original image, whereas PSNR represents a measure of the peak error. Lower the value of MSE, then loweris the error. The MSE(Mean Square Error) and PSNR both are used to calculate image compression quality.the MSE consists the cumulative square errorr of both original and compressed image,low error for the lower value of the MSE and PSNR denotes the peak error measure. To Calculate the PSNR,firstly we find the mean-squared error using the following equation: MSE =,,, Here, M and N represents the number of rows and columns of the given input image.after we can calculate PSNR by using following: PSNR = 10 log Fig. Watermarked image Resultantt PSNR: 41.7412534 V. WATERMARKING ATTACKS Nowadays there are several harmful attacks that may intentional or unintentional that can be done over a watermarked object. There are various kind software that are available to perform attacks over the watermarking methods to check its robustness. It is basically done to protect the watermark from any future malicious attacks. i) Interference attacks: Interference attacks are those attacks in which we add some additional noise to the object that is watermarked. Few examples of Interference attacks are quantization, Lossy compression, collusion, remodulation, denoising, averaging, and noise storm. ii) Removal Attacks: In Removal attacks, we try to remove the watermark data from the object that is watermarked. Thesee kinds of attacks intend to exploit the fact that the watermark can be easily harmed by additive noise signal present in the host signal. iii)geometric attacks: Geometric attacks are intend to affect the image geometry,for example rotation, flipping, cropping,etc and these should be detectable.example of geometric attack is cropping attack from left-hand side and top of the image. DOI: 10.2117/ijet/2017/v9i3/170903S004 Vol 9 No 3S July 2017 24

VI. CONCLUSION In this paper we watermarked the images by our choice using 2 dimensional discrete cosine transform. We calculated MSE and PSNR to compare original input image and reconstructed image. This watermarking algorithm provides a better quality picture as we are reduce the coefficient of watermark. The above algorithm can be used to watermark the image that is used in the web applications and where we need different copyright over an image as it need less processing time. Furthermore in future we can analyze different image transform algorithms for improvement of different parameters. VII. REFERENCE: [1] Mohamed A. Suhail, Mohammad S. Obaidat, Digital Watermarking-Based DCT and JPEG Model IEEE Transactions on Instrumentation and Measurement, Vol. 52, No. 5, Oct 2003. [2] SoumitraRoy,Arup Kumar Pal A blind DCT based color watermarking algorithm for embedding multiple watermarks Int. J. Electron. Commun. (AEÜ) 72 (2017) 149 161 [3] Priyanka,SushilaMaheshkar, An Efficient DCT based Image Watermarking Using RGB Color Space,2015 IEEE 2 nd International Conference on Recent Trends in Information Systems. [4] Uma Rajput,NirpumaTiwari, A Novel techniques for RGB Invisible Watermarking Based on 2-DWT-DCT Algorithm [5] Pillai Praveen Thulasidharan,Madhu S. Nair, QR code based blind digital image watermarking with attack detection code, Int. J. Electron. Commun. (AEÜ) 69 (2015) 1074 104 [6] G. Bouridane. A, M. K. Ibrahim, Digital Image Watermarking Using Balanced Multi wavelets, IEEE Transaction on Signal Processing 54(4), (2006), pp. 1519-1536. [7] Pillai Praveen Thulasidharan, Madhu S. Nair, QR code based blind digital image watermarking with attack detection code, Int. J. Electron. Commun. (AEÜ) 69 (2015) 1074 104 [] Yu Yang,Min Lei,Xiaoming Liu, ZhiguoQu, Cheng Wang, Novel Zero-Watermarking Scheme Based on DWT-DCT,China Communications July 2016 [9] Gonzalez RC, Woods RE. Digital image processing. 3 rd ed. India: Pearson Education. [10] SaeidFazli, MasoumehMoeini, A robust image watermarking method based on DWT,DCT, and SVD using a new technique for correction of main geometric attacks Optik 127(2016) 964 972 [11] Shabir A. Parah, Javaid A. Sheikh, Nazir A. Loan, Ghulam M. Bhat, Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing Digital Signal Processing 53 (2016) 11 24 [12] W.N Cheung, Digital Image Watermarking in Spatial and Transform Domains, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119) [13] Barni M, Bartolini F, Cappellini V, Piva A. A DCT-domain system for robust image watermarking Signal Process 199;66(3):357 72. [14] Khalili M. DCT-Arnold chaotic based watermarking using JPEG-YCbCr. Optik-Int J Light Electron Opt 2015;126(23):4367 71. DOI: 10.2117/ijet/2017/v9i3/170903S004 Vol 9 No 3S July 2017 25