A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

Similar documents
Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

An Improved Performance of Watermarking In DWT Domain Using SVD

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

International Journal of Advance Research in Computer Science and Management Studies

Invisible Watermarking Using Eludician Distance and DWT Technique

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Improved Qualitative Color Image Steganography Based on DWT

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Principal Component Analysis Based Digital Video Watermarking

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Digital Watermarking with Copyright Authentication for Image Communication

Image Processing and Watermark

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

A New DCT Based Watermarking Method Using Luminance Component

A new robust watermarking scheme based on PDE decomposition *

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Efficient Image Steganography Using Integer Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform

Review on Digital Watermarking Images

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

A New DCT based Color Video Watermarking using Luminance Component

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

A Survey of Digital Image Watermarking Techniques

A Digital Video Watermarking Algorithm Based on LSB and DCT

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A Robust Watermarking Algorithm For JPEG Images

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Robust Image Watermarking based on DCT-DWT- SVD Method

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Efficient Watermarking Technique using DWT, SVD, Rail Fence on Digital Images

Digital watermarking techniques for JPEG2000 scalable image coding

Invisible Watermarking Audio Digital with Discrete Cosine Transform

Speech Modulation for Image Watermarking

Digital Watermarking Using 2-DCT

Keywords PSNR, NCC, DCT, DWT, HAAR

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Comparison of wavelet based watermarking techniques Using SVD

Digital Image Steganography Using Bit Flipping

DWT-SVD Based Digital Image Watermarking Using GA

Watermarking Moble Phone Color Images With Error Correction Codes

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

Robust DWT Based Technique for Digital Watermarking

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

Information and Communications Security: Encryption and Information Hiding

Mrs. Vandana Assistant Professor (Dept. of Computer Science and Engg.) Hindu College of Engineering, Sonepat, Haryana, India

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Image and Video Watermarking

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

Random Image Embedded in Videos using LSB Insertion Algorithm

A Robust Technique For Digital Watermarking using 3-DWT- SVD and Pattern Recognition Neural Network

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Performance Analysis of DCT Based Digital Image Watermarking Using Color Spaces Effects

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Appendix A. Definition of Terms

QR Code Watermarking Algorithm based on Wavelet Transform

Implementation of ContourLet Transform For Copyright Protection of Color Images

HISTOGRAM BASED WATERMARKING USING ENTROPY TECHNIQUE IN DIGITAL IMAGES

Implementation of Audio Watermarking Using Wavelet Families

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Implementation of Audio Watermarking Using Wavelet Families

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

Multiple Binary Images Watermarking in Spatial and Frequency Domains

VIDEO WATERMARKING USING DCT AND DWT TRANSFORMS

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Research Article DCT-PCA Based Watermarking on E-governance Documents

Transcription:

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing Jasvinder Singh 1, Mehak Aggarwal 2, Kulbhushan Singla 3 1Student M.Tech Dept. of Computer Science and Engineering, Lala Lajpat Rai Institute of Engineering & Technology, Moga, Punjab, India 2Associate Prof. Dept. of Computer Science and Engineering, Lala Lajpat Rai Institute of Engineering & Technology, Moga, Punjab, India 3 Professor Dept. of Electronics and Communication Engineering, Guru Teg Bahadur Khalsa Institute of Engineering & Technology, Chhapian Wali, Malout, Punjab, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract :-This work presents a digital image watermarking technique. It is a semi-blind process to insert invisible watermarks aimed towards strengthening the robustness, imperceptibility and security of watermark embedded in the watermarked image. In direction to achieve the mentioned objectives, this work luminance based area selection and block pixel value differencing. Watermark is embedded in blocks pixels of image based on the difference of two pixels. Calculated inter pixel differencing two pairs with highest difference values are selected for embedding.this highest values of difference is compared in range table and find the maximum number of bits of information. Thus, The Quality of image is maintained by using block pixel value differencing. This method improves the embedding capacity and makes the information undetectable. The proposed algorithm is quantitatively validated using three performance metrics namely peak signal to noise ratio, mean squared error and bit error rate. This approach is tested against variety of attacks and filter which shows a great ability to preserve the watermark against these attacks. Keywords - Color image, PVD, log average luminance, MSE, PSNR, BER, watermarking techniques 1. INTRODUCTION In recent years, unauthorized distribution of digital media such as audios, videos and images has become the most important challenge that faces media copyright protection. The digital communication technology, like internet technology confronts various troubles related to the privacy and security of the data. Security techniques are required because of illegal access of data without permission. Many techniques are used for providing the security of digital data like encryption, decryption, cryptography, steganography and digital watermarking. Authentication and information hiding and proof ownership have also become important issues. To accomplish these issues, watermarking technology is used. Digital watermarking[1] is a method for embedding some secret information and additional information in the cover image.. Digital watermarking addresses the growing concerns of theft and tampering through the use of advanced signal processing strategies to embed copyright and authentication information within multimedia content. Digital watermarking is use to authentication, owner identification, content protection and copyright protection. In other words, a watermark is a pattern of bits inserted into multimedia data such as digital image, audio or video file that helps to identify the file s copyright information. Watermark can provide information that serves as proof of ownership. Watermark may be a visible signature or logo placed over an image to determine the owner of that image. 2. LITERATURE REVIEW Digital watermarking techniques are classified based on two working domain spatial domain and frequency domain. The spatial domain techniques works directly on pixels. It embeds the watermark by modifying the pixels value. Most commonly used spatial domain techniques are LSB and PVD. In LSB technique, these approaches use minor changes in the pixel value intensity. The watermark data is embedded into least significant bits of pixels. In PVD, method, it uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. It offers the advantage of conveying a large amount of message, while still maintaining the consistency of an image characteristic after data embedding. Most commonly used transform domain techniques are DCT, DWT and SVD [9]. All these techniques work on frequency components of image to embed watermark data. Transform domain techniques [2] embed the watermark by modifying the transform domain coefficients. 3. LUMINANCE BASED AREA SELECTION AND BLOCK PIXEL VALUE DIFFERENCING We proposed a new technique for watermarking embedding in digital image. The area for embedding is selected using luminance based location method [2]. J. Hussein [6], in his work had developed a method for selecting the embedding area in cover image using 2017, IRJET Impact Factor value: 5.181 ISO 9001:2008 Certified Journal Page 1085

Luminance of image. The image of size 512X512 is divided into 8 8 blocks and the following operations are needed and must be performed to accomplish the embedding and extracting processes.rgb YC bc r conversion 3.1 RGB to YC bc r Conversion The RGB color space is converted to YCbCr color space for each 8 8 block using the equations (1): selected for embedding the information. This highest values of difference is compared in range table and we find the maximum number of bits of information (from secret message). This method not only improves the embedding capacity, but also makes the information undetectable. The complete embedding and extracting method is described in following section. Y =0.299 R + 0.587 G + 0.114 B Cb = 0.596 R - 0.275 G - 0.321 B Cr = 0.212 R - 0.523 G - 0.311 B (1) where R, G, and B are red, green and blue components of RGB color space respectively. 3.2 Log-Average Luminance The block selection criteria are dependent on logaverage luminance for the entire image and logaverage luminance for each block. The log-average luminance Yavg is calculated as shown in the equation (2) L avg = exp( log(δ+yx,y)/n) (2) L avg : Log-average luminance Yx,y: Luminance Y of the pixel at x,y δ : A small value to avoid taking the log of a completely black pixel whose luminance is zero N: The number of pixels in the image. 3.3 Block Selection Criterion When 512 512 host image is divided into 8 8 blocks, 4096 blocks are produced. Since the watermark size is 32 32 pixels and if we consider minimum embedding capacity of 1 bit, each block can be used to embed 32 bits minimum and thus we require only 256 blocks to embed the entire watermark. After finding the log-average luminance for the entire image and for each block; the best blocks are chosen from the blocks that have log-average luminance closer to the logaverage luminance of the entire image [6]. To do that we select the blocks with log average luminance in the range [Yavg-β, Yavg+β,] where Yavg is the log average luminance of the image and β is the minimum floating-point value that is enough to determine adequate number of blocks. 3.4 Embedding process Now in selected blocks separate RGB components of color image. We can embed our watermark using block pixel value differencing. In this method, from a selected block, we further divided the block into segments of 2X2 pixels (for each color plane). In each segment, we calculated inter pixel differences and two pairs with highest difference values are Figure 1 Watermarking Embedding 3.4.1 Embedding Algorithm i. Read this Cover Image and separate its RGB components. ii. Divide the selected block of size 8X8 into the segments of 2X2 pixels. iii. Calculate the difference value d i for each segment of two consecutive non-overlapping pixels p(i) and p(i+1) and is given by d i= p(i) - p(i+1) iv. Now find the two highest difference value among four difference values of each colour plane which are not made by common pixel value. v. Making the optimal range Table R i for the di such that R i =min (u i,d i),where ui di This is the optimum range where the difference lie. vi. Compute the number of secret data bits t to be embedded in selected pixel pair from the width w i of the optimum range, can be defined as t=log2 w i. vii. Read t bits from secret message and convert it into its decimal value b. 2017, IRJET Impact Factor value: 5.181 ISO 9001:2008 Certified Journal Page 1086

viii. Now finding the new difference value d i using m= d i =l i +b. 3.4.3 Extraction Algorithm ix. Modify the values of p i and P i+1 by the original PVD method as discussed in review section. (Where p i and P i+1 are R and B components). Here only R and B components are selected because these two components add very little to Y value and uniformly distributing the difference does not alter their values to much extent and Y values remains almost same x. Now repeat the steps for next segment in selected block and repeat the process for all selected blocks depending ipon the size of watermark. Range table:- Range Difference Number of bits 0-8 8 2 3 9-16 8 2 3 17-32 16 2 4 33-64 32 2 5 65-128 64 2 6 129-256 128 2 7 3.4.2 Quality measurement The quality of the watermarked image is measured by finding Mean Square Error and peak signal to noise ratio (PSNR) values of the watermarked image and the original image. Lower MSE values and higher PSNR values imply good embedding results. Figure 3 Extraction process For the extraction process, the blocks are selected in the same manner as discussed in embedding procedure. While decoding the data from the watermarked-image, the range table, which is used at encoding, is required. The following steps used for extracting the hidden data: i. Read this Cover Image and separate its RGB components. ii. Divide the selected block of size 8X8 into the segments of 2X2 pixels. iii. Calculate the difference value d i for each segment of two consecutive non-overlapping pixels p(i) and p(i+1) and is given by d i= p(i) - p(i+1) iv. Now find the two highest difference value among four difference values of each colour plane which are not made by common pixel value. v. Compute the b by b = di'-li. Convert b' into binary of t bits, where t=log2 w i. These t bits are the hidden secret data. Now repeat the process for other pixels by moving right to left and then to top for an image and extract the message bits before the previously extracted bits. After that these binary information is converted in to watermark image 4. Experimental Results Figure 2 PSNR values of various images The imperceptibility and robustness of the proposed scheme demonstrated is using MATLAB, quality measures such as are used. The images used to calculate the PSNR (peak signal to noise ratio), BER (bit error ratio) and MSE (mean square error) are fruits, peppers, Baboon, whitewater images and the results of proposed method on these images have been described in Table 1. The proposed method is 2017, IRJET Impact Factor value: 5.181 ISO 9001:2008 Certified Journal Page 1087

White Water Baboon Peppers Fruits Images International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 tested with various attacks and the quality parameters like highpass, lowpass, Gaussian, median and JPEG compression are listed in Table 2. The result values of Table 1 clearly indicate the robustness and quality of the image is not degraded. The efficiency of the proposed method in this paper is compared against DCT method. of the embedded watermark. The blocks for embedding are selected using luminance of the image. The watermark is embedded using block pixel value differencing, which is more effective than DCT method. only the blocks with logaverage luminance close to the log-average luminance of the entire image are used to embed the watermark. The test results show that these blocks do not degrade the image when the pixels luminance value is increased or decreased. The experimental results show a high degree of robustness against a number of unintentional attacks such as highpass filter, lowpass filter, Gaussian, median, impulse and JPEG compression. The efficiency of the embedding process is measured by using PSNR value between the original and the watermarked image. Fruits Image pepper Image Figure 4 PSNR values after various attacks Table 1: Comparison of Results of Hussein s and Proposed Method J.A.Hussei Proposed Method n[6] method PSNR PSNR MSE BER 32.512 60.809 0.217 0.0164 Baboon Image Whitewater Image 35.000 61.460 0.187 0.0163 34.990 59.510 0.293 0.0168 Watermark Image 32.650 59.797 0.274 0.0167 5. CONCLUSION In this research paper, a new approach has been proposed. This approach achieves high imperceptibility and robustness 2017, IRJET Impact Factor value: 5.181 ISO 9001:2008 Certified Journal Page 1088

White Water Baboo n Peppe rs Fruits Images International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Table 2: Values of Various Parameters after Attacks Attacks Highpass Lowpass Gaussian4 Median 3 Impulse 0.5 Jpeg 0.50 MSE 17.0518 19.7868 27.0390 15.4781 16.5282 37.5176 PSNR 49.8845 49.9668 39.8655 51.3963 50.3883 29.3479 BER 0.0200 0.0202 0.0251 0.0195 0.0198 0.0341 MSE 17.8893 10.9906 27.9048 16.3753 17.4190 38.4130 PSNR 49.7523 50.9845 39.7286 51.2545 50.2477 29.1999 BER 0.0201 0.996 0.0252 0.0195 0.199 0.342 MSE 18.5009 18.4421 28.6055 16.9961 18.0203 39.0512 PSNR 49.6582 49.6672 39.6209 51.1589 50.1552 28.1078 BER 0.201 0.0201 0.0252 0.0195 0.0199 0.0344 MSE 18.5054 16.1416 28.6351 17.0277 18.0790 39.1310 PSNR 49.6575 50.0329 39.6164 51.1541 50.5463 29.0956 BER 0.0201 0.0200 0.0252 0.0195 0.0199 0.0344 Table 3: Watermark extract using median filter after adding Impulse noises REFERENCES Images Impulse(0.10) Median filter(3) MSE 39.6673 7.8026 Fruits PSNR 20.8411 52.8480 BER 0.0480 0.0189 MSE 38.2848 7.0640 Peppers PSNR 21.1668 53.0171 BER 0.0472 0.0189 MSE 38.7398 6.2177 Baboon PSNR 21.0569 53.2194 BER 0.0475 0.0188 MSE 38.8564 7.0485 Whitewater PSNR 21.1048 52.3472 BER 0.476 0.0188 [1] Shraddha S. Katariya, Digital Watermarking: Review, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 2, February 2012. [2] Agarwal Aditi, Bhadana Ruchika and Chavan Satishkumar, A Robust Video watermarking Scheme using DWT and DCT International Journal of Computer Science and Information Technologies, Vol. 2 (4), 1711-1716 (2011) [3] Chan Pik-Wah and R. Lyu Michael, A DWT-based Digital Video Watermarking Scheme with Error Correcting Code Information and Communications Security Volume 2836 of the series Lecture Notes in Computer Science pp 202-213 (2003) [4] Gupta Preeti, Cryptography based digital image watermarking algorithm to increase security of watermark data International Journal of Scientific & Engineering Research, Volume 3, Issue 9, (2012) [5] J.A.Hussein,Luminance-based Embedding Approach for Color Image Watermarking, I.J. Image, Graphics and Signal Processing, 2012, 3, 49-55. [6] J. A. Hussein, Spatial Domain Watermarking Scheme for Colored Images Based on Log-average Luminance, Journal of Computing, vol. 2, No. 1,2010, pp. 100-103. [7] Mandal J. K. and Das Debashis, Steganography Using Adaptive Pixel Value Differencing (APVD) of Gray Images Through Exclusion of Overflow/Underflow. CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 93 102,(2012) [8] Mohan B.Chandra Kumar S. Srinivas, A Robust Image Watermarking Scheme using Singular Value Decomposition JOURNAL OF MULTIMEDIA, VOL. 3, NO. 1,(2008) [1] Md. Maklachur Rahman, A DWT, DCT and SVD based watermarking technique to protect the image piracy, International Journal of Managing Public Sector 2017, IRJET Impact Factor value: 5.181 ISO 9001:2008 Certified Journal Page 1089

Information and Communication Technologies (IJMPICT) Vol. 4, No. 2, June 2013. [2] Saxena Divya, Digital Watermarking Algorithm based on Singular Value Decompositio and Arnold Transform International Journal of Electronics and Computer Science Engineering ISSN- 2277-1956/V1N1-22- 27(2012) [3] Tang Chih-Wei and Hangin Hsueh-Ming, A robust digital image watermarking scheme that combines image feature extraction and image normalization IEEE Transactions on Signal Processing ( Volume: 51, Issue: 4, Page(s): 950-959)(2003) [4] Yassin1 Nisreen I., Salem2 Nancy M., and Adawy Mohamed I. El, Block Based Video Watermarking Scheme Using Wavelet Transform and Principle Component Analysis IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3,(2012) 2017, IRJET Impact Factor value: 5.181 ISO 9001:2008 Certified Journal Page 1090