Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Similar documents
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A new wavelet based logo-watermarking scheme

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Robust Image Watermarking based on DCT-DWT- SVD Method

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Feature Based Watermarking Algorithm by Adopting Arnold Transform

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

A HYBRID WATERMARKING SCHEME BY REDUNDANT WAVELET TRANSFORM AND BIDIAGONAL SINGULAR VALUE DECOMPOSITION

An Improved Performance of Watermarking In DWT Domain Using SVD

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A DUAL WATERMARKING USING DWT, DCT, SVED AND IMAGE FUSION

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Artificial Intelligence Techniques for DWT Based Image Watermarking

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Comparison of wavelet based watermarking techniques Using SVD

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DC Coefficients Based Watermarking Technique for color Images Using Singular Value Decomposition

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Implementation and Comparison of Watermarking Algorithms using DWT

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Adaptive Quantization for Video Compression in Frequency Domain

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Digital watermarking techniques for JPEG2000 scalable image coding

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Efficient Watermarking Technique using DWT, SVD, Rail Fence on Digital Images

Robust biometric image watermarking for fingerprint and face template protection

Robust copyright protection scheme for digital images using the low-band characteristic

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

DIGITAL IMAGE WATERMARKING APPROACH BASED ON QR AND DWT METHOD

A wavelet-based watermarking for digital images of different size

FRAGILE WATERMARKING USING SUBBAND CODING

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

On domain selection for additive, blind image watermarking

DWT-SVD Based Digital Image Watermarking Using GA

A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition

Digital Watermarking with Copyright Authentication for Image Communication

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Primal Sketch Based Adaptive Perceptual JND Model for Digital Watermarking

Data Hiding in Video

A Blind DWT-SCHUR Based Digital Video Watermarking Technique

Robust Image Watermarking using DCT & Wavelet Packet Denoising

QR Code Watermarking Algorithm based on Wavelet Transform

DWT-SVD based Multiple Watermarking Techniques

Digital Image Watermarking Using DWT Based DCT Technique

Invisible Watermarking Using Eludician Distance and DWT Technique

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A Modified SVD-DCT Method for Enhancement of Low Contrast Satellite Images

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

Strongly Robust and Highly Secured DWT-SVD Based Color Image Watermarking: Embedding Data in All Y, U, V Color Spaces

Wavelet Based Blind Technique by Espousing Hankel Matrix for Robust Watermarking

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Real Time Hybrid Digital Watermarking Based On Key Dependent Basis Function

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

A Robust Image Hiding Method Using Wavelet Technique *

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

A new robust watermarking scheme based on PDE decomposition *

A ROBUST NON-BLIND HYBRID COLOR IMAGE WATERMARKING WITH ARNOLD TRANSFORM

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES

A blind Wavelet-Based Digital Watermarking for Video

Robust DWT Based Technique for Digital Watermarking

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

Efficient Image Steganography Using Integer Wavelet Transform

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Transcription:

Digital Watermarking using Fuzzy Logic approach based on DWT and SVD T.Sridevi Associate Professor CBIT Hyderabad,India S Sameena Fatima,Ph.D Professor, OU, Hyderabad,India ABSTRACT Digital image watermarking is implemented using fuzzy logic approach based on transform domain. Fuzzy logic is an approach based on degrees of truth rather than usual true or false i.e., Boolean logic. In this paper, we use a reference image instead of original image. To get a reference image Directive contrast and Threshold value are calculated for middle and high frequency bands. A transform domain with the help of fuzzy logic system is used to embed the watermark in the reference image. Here fuzzy logic is used to find the alpha value that is used to embed the watermark. Watermark embedding is based on DWT and Singular Value Decomposition (SVD). After decomposing the cover image into four bands, SVD is applied to one of the frequency bands, and embed the same watermark data by modifying the singular values. Attacks are also performed on watermarked image. Quantitative measures like PSNR, NCC are also calculated to test the watermarked image and also extracted watermarks with and without attacks General Terms Watermarking, Security, Algorithms. Keywords Digital watermarking, Fuzzy logic, Original image, Directive contrast, Threshold, Reference image, DWT (Discrete Wavelet Transformation), SVD (Singular Value Decomposition). 1. INTRODUCTION The development of digital technology brings a demanding of digital data protection. Among different protection techniques, digital watermarking appears as an effective solution. Digital image watermarking is a technique used to hide the information in the image for copy right protection. The main issues to be considered in the watermarking are imperceptible, robustness, blindness and capacity. Imperceptible is required so that a watermark may remain invisible in order to maintain its secrecy i.e., the quality of image should not be destroyed. Robustness means that a watermark is able to effectively resist on common digital image attacks, such as low pass filtering, cropping, and rotation. Capacity is defined as a technique used to embed the maximum watermark. The two techniques to embed watermark are spatial domain techniques [6,7] and transform domain techniques [8-10]. Due to poor fidelity and robustness spatial domain is not that suitable for watermark embedding. Watermark in frequency domain can be embedded in any transforms like DCT(Discrete domain transform),dwt(discrete wavelet transform) etc. A wavelet based watermarking exploiting HVS (human visual system) was proposed by Barni et al. [11]. Chaotic logistic map based watermarking was proposed by Dawei et al. [12].This watermarking algorithm illustrated robustness against geometric attacks and susceptible to common attacks. Liu et al. [3] proposed SVD based watermarking, in which singular values of cover image are modified by adding watermark and extraction is reverse process. Sridevi et al[5] presented a watermarking method based on DWT and Singular Value Decomposition (SVD). Watermark is embedded by modifying the singular values. A robust reference watermarking method is proposed by Joo et al. [4]. Watermark is embedded at locations where the variation between the lower bands of both cover image and reference image is minute. Liu et al. [3] tailored Joo s scheme. Reference image is constructed where all the high frequency components are initialized to zero. A location is computed using some equation which is based on the variation between cover image and reference image. The value of the equation decides the watermark embedding. A new reference watermarking technique proposed by Bhatnagar etal[2].the DC (directive contrast )for each sub band is calculated and Reference image is constructed by setting l the wavelet coefficients to zero which have DC less than a given threshold. In the modified singular values watermark is embedded in the reference image. David J. Coumou et al. [1] projected a watermarking technique where a fuzzy inference system is used to compute the positions of the watermark which will achive both robustness and fidelity This paper mainly focuses on DWT and SVD. Fuzzy logic is applied for finding the pixel adjustment, to embed watermark for achieving fidelity. Here new reference image is formed using directive contrast and threshold. The difference between cover image and reference image is found..based on the difference fuzzy logic is applied to find the pixel adjustment. 2. PRELIMINARIES The Preliminaries are discussed below. 2.1 Discrete Wavelet Transform The Discrete Wavelet Transform (DWT)(fig 1) is achieved by filtering the signal through a series of digital filters at different scales.an outstanding space and frequency energy compaction is provided by wavelet techniques and hence DWT has received an interest in several signal and image processing applications. 16

2.2 SVD Fig 1:Discrete Wavelet Transformation Original The singular value decomposition of a rectangular matrix A is a decomposition of the form A=UDV T (2) Where A is an m*n matrix, U, V are ortho-normal matrices. D is a diagonal matrix comprised of singular values of A. D = diag (σ1, σ2, σ3...). It is important to note that each singular value specifies the luminance of an image layer while the corresponding pair of singular vectors specifies the geometry of the image layer. In SVD-based watermarking, several approaches are possible. A common approach is to apply SVD to the whole cover image. [5] 2.3 FUZZY LOGIC The principle of fuzzy logic reaches the human approach in the sense that the variables treated are not binary but of variable linguistic relatives of human language as high contrast, a lot more clearly, very textured, very homogeneous etc. Moreover, these linguistic variables are processed with rules that refer to some knowledge of system. The fuzzifier and the defuzzifier have the role of converting external information in fuzzy quantities and vice versa. LL LH HL HH 3. PROPOSED METHOD The Proposed method for embedding watermark in the cover image is discussed below 3.1 Fuzzy Rules In this paper, fuzzy rules are applied on the intensities of pixel values as in [1]. 1. Inputs to Fuzzy are collected from the sub images that connect to each corner of sub image that is being manipulated to embed the watermark feature. 2. Fuzzifier identifies the four input sub images with the labels par_1, par_2, par_3, par_4. (The mean intensity of the pixel elements contained in each input sub-image is calculated as the inputs to Fuzzy) 3. Each input is composed of three membership functions that are based on the gray scale of Black, Gray, and White. 4. The insertion sub image is manipulated sub image for the watermark feature. 5. The output of Fuzzy is pixel adjustment (PixAdj) applied uniformly to watermark and is based on the Three output membership function Minimum (min), Medium (med), Maximum (max). 6. These rules correlate the amount of adjustment applied to the pixels in watermark with the intensity of the pixels contained in par_1, par_2, par_3 and par_4. The fuzzy membership functions are shown in fig 3. FIS as in fig 2 consists of four function blocks. They are 1. Fuzzifier: It transfers the crisp input to fuzzy sets. 2. Knowledge Base: It mainly consists of database and rule base. The data base defines the membership functions of the linguistic variables. The rule base consists of a set of IF- THEN rules that can be given by a human expert or also can be extracted from the linguistic description of the data. 3. Inference Engine: It is a general control mechanism that exploits the fuzzy rules and the fuzzy sets defined in the Knowledge Base in order to reach certain conclusion. 4. De-Fuzzifier: It transfers the fuzzy sets into crisp outputs. Fuzzifier Inference Engine Knowledge Base Fig 2:Fuzzy Inference system[3] De-Fuzzifier Fig 3:Fuzzy membership functions 3.2 Procedure to find embedding strength 1. Perform 1-level dwt to original image. 2. Take LL-band and apply one level dwt to LL-band. 3. Calculate directive contrast and threshold for middle and high frequency bands [2]. 4. Initialize high frequency components to zero whose directive contrast are less than the Threshold [2]. 5. Perform inverse dwt and obtain reference image. 6. Replace reference image in the selected LL band (step2) and apply inverse dwt. 7. A new reference image is obtained. 8. Perform 1 level dwt to original image and this new reference image 9. Select LL BANDS of both the images and calculate difference between them Use fuzzy logic as shown in fig 4 to build the rules for pixel adjustment. 17

3.3 Watermark embedding[5] The steps for embedding the Algorithm is 1. Using DWT, decompose the cover image A into 4 sub bands: LL, HL, LH, and HH. 2. Apply SVD to HL sub band cover image: A = U a D a V a, σ i, i=1,,n are the singular values of D a. 3. Using DWT, decompose the watermark image W into 4 sub bands: LL, HL, LH, and HH. 4. Apply SVD to the visual watermark: W = U W D W V T W, where σ wi, i = 1,,n are the singular values of D W. 5. Modify the singular values of the cover image in each sub band with singular values of visual watermark:the value of pixel adjustment (α) from the fuzzy logic. σ * = σ i + α σ wi 6. Obtain the 4 sets of modified DWT coefficients A w = U σ * V T 3.3 Watermark extraction Using DWT, decompose the watermarked (and possibly attacked) cover image A w into 4 sub band s: LL, HL, LH, and HH. 1. Apply SVD to sub band of watermarked image A w = U σ * V T (3) 2. Extract the singular values from one sub band. The value of pixel adjustment (α) from the fuzzy logic σ wi = (σ * i - σ i )/α (4) 3. Construct the visual watermark using the singular vector T W= U w σ w V w (5) 4. We computed the singular values in the sub bands 4. RESULTS In order to explore the performance of the proposed watermarking algorithm, MATLAB platform is used and a number of experiments are performed on different images. The sample images are shown in Fig 5(a-h) below. The PSNR values are shown in Fig 6.To test the robustness of the algorithm PSNR values are evaluated between original images and modified images. Except noise attack all the remaining attacks are resistant to the attacks. The embedding strength is based on the HVS properties of the images. Original DWT Calculate Directive contrast (DC) and threshold (T) for LH, HL, HH bands Set coefficients of LH, HL, HH band to zero whose DC<T IDWT Reference LL HL LL HL LH HH LH HH Difference (LL&LL ) Fuzzy Rules Pixel Adjustment Fig 4: Procedure for finding embedding Pixel Adjustment 18

PSNR in db International Journal of Computer Applications (0975 8887) a. Original image b. Reference image c. Watermarked image(psnr=42.3556dban d NCC=0.999) d. Original watermark e. Extracted watermark(psnr= 37.6859 db and NCC=0.999) f. Extracted watermark after rotation(psnr=46.7970db) g. Extracted watermark after histogram equalization(psnr=41.75d B) h. Extracted watermark after guassian noise(psnr=11.2648db) Fig 5(a-h):Sample image and extracted images PSNR Values 50 45 40 35 30 25 20 15 10 5 0 reconstrution value =10 reconstruction value = 50 reconstruction value=100 Fig 6: PSNR values for different reconstruction values 19

5. CONCLUSION A robust watermarking using fuzzy logic approach based on DWT and SVD algorithm was implemented.svd is a convenient tool for Watermarking in Discrete Wavelet Transform domain. The fuzzy logic decided how much of watermark has to be added to the cover image, which is based on the image properties.the Singular Values (k) increases, the value of PSNR is not varying much. Different attacks are implemented.the noise attack is not resistant to the algorithm The PSNR values of retrieved watermark is very low but the visual quality is good. This investigation may be further extended to multiple levels of DWT decomposition and different watermark representations.in SVD watermarking, singular values are embedded into singular values, instead of singular values any other vector that represents some information may be used. 6. REFERENCES [1]. David J. Coumou, Athimoottil Mathew, A fuzzy logic approach to digital image watermarking, Rochester Institute of technology, 2000. [2]. Bhatnagar, Gaurav, and Balasubramanian Raman. "A new robust reference watermarking scheme based on DWT-SVD." Computer Standards & Interfaces31.5 (2009): 1002-1013. [3]. J.L. Liu, D.C. Lou, M.C. Chang, H.K. Tso, A robust watermarking scheme using self reference image, Computer standards and interfaces 28 (2006) 356-367. [4]. S.Joo, Y. Suh, J. Shin, H. Kitkuchi, A new robust watermarking embedding into wavelet DC components, ETRI Journal 24 (5) (2002) 401-404. [5]. T.Sridevi etal, Secure Watermarking based on svd and wavelets, ICGST International Journal on graphics,vision and processing, Volume 10,IssueV,Dcember 2010,pp 63-69. [6]. A.G. Bors, I. Pitas, watermarking using DCT domain constraints, Proceedings of IEEE International Conference on Processing, vol. 3, 1996, pp. 231 234. [7]. R.G.V. Schyndle, A.Z. Tirkel, C.F. Osbrone, A digital watermark, Proceedings of IEEE International Conference on Processing, vol. 2, 1994, pp. 86 90. [8]. D. Kundur, D. Hatzinakos, Towards robust logo watermarking using multiresolution image fusion, IEEE Transcations on Multimedia 6 (2004) 185 197. [9]. J. Ohnishi, K. Matsui, Embedding a seal in to a picture under orthogonal wavelet Transform, Proceedings of IEEE International Conference on Multimedia and Computing system, 1996, pp. 514 521, IEEE, Hiroshima, Japan. [10]. P. Meerwald, A. Uhl, A survey on wavelet domain watermarking algorithms, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 505 516, SPIE, CA, USA. [11]. M. Barni, F. Bartolini, A. Piva, Improved wavelet based watermarking through pixel wise masking, IEEE Transcations on Processing 10 (2001) 783 791. [12]. Z. Dawei, C. Guanrong, L. Wenbo, A chaos based robust wavelet domain watermarking algorithm, Chaos, Solitons, and Fractals 22 (2004) 47 54. IJCA TM : www.ijcaonline.org 20