APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

Similar documents
Invisible and Robust Color Image Watermarking in Contourlet Domain for Image Authentication

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Blind Digital Watermarking in Contourlet Domain

Comparison of wavelet based watermarking techniques Using SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

An Improved Performance of Watermarking In DWT Domain Using SVD

Robust Image Watermarking based on DCT-DWT- SVD Method

Implementation of ContourLet Transform For Copyright Protection of Color Images

Hybrid DCT-CT Digital Image Adaptive Watermarking

A new robust watermarking scheme based on PDE decomposition *

A NEW COLOR IMAGE WATERMARKING TECHNIQUE USING MULTIPLE DECOMPOSITIONS

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

QR Code Watermarking Algorithm based on Wavelet Transform

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A HYBRID WATERMARKING SCHEME BY REDUNDANT WAVELET TRANSFORM AND BIDIAGONAL SINGULAR VALUE DECOMPOSITION

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Image De-noising using Contoulets (A Comparative Study with Wavelets)

Digital Image Steganography Techniques: Case Study. Karnataka, India.

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A Robust Watermarking Algorithm For JPEG Images

A New Approach to Compressed Image Steganography Using Wavelet Transform

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Digital Watermarking with Copyright Authentication for Image Communication

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

DWT-SVD based Multiple Watermarking Techniques

IMAGE ENHANCEMENT USING NONSUBSAMPLED CONTOURLET TRANSFORM

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

Implementation of Audio Watermarking Using Wavelet Families

An Improved Blind Watermarking Scheme in Wavelet Domain

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Implementation of Audio Watermarking Using Wavelet Families

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

A Novel NSCT Based Medical Image Fusion Technique

Keywords - DWT, Lifting Scheme, DWT Processor.

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

Digital Watermarking: Combining DCT and DWT Techniques

BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES

A Novel HVS-based Watermarking Scheme in CT Domain

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

On domain selection for additive, blind image watermarking

A Novel Semi-Blind Reference Color Image Watermarking using DWT-DCT-SVD

ROBUST BLIND IMAGE WATERMARKING BASED ON MULTI-WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Ripplet: a New Transform for Feature Extraction and Image Representation

Implementation of No-Reference Image Quality Assessment in Contourlet Domain

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Robust Digital Image Watermarking based on complex wavelet transform

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Design of direction oriented filters using McClellan Transform for edge detection

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Improved Qualitative Color Image Steganography Based on DWT

Wavelet Transform (WT) & JPEG-2000

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A DWT Based Steganography Approach

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

International Journal of Advance Research in Computer Science and Management Studies

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

Performance Improvement by Sorting the Transform Coefficients of Host and Watermark using Unitary Orthogonal Transforms Haar, Walsh and DCT

Robust biometric image watermarking for fingerprint and face template protection

A new wavelet based logo-watermarking scheme

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

Efficient Watermarking Technique using DWT, SVD, Rail Fence on Digital Images

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

A Blind DWT-SCHUR Based Digital Video Watermarking Technique

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

IMAGE SUPER RESOLUTION USING NON SUB-SAMPLE CONTOURLET TRANSFORM WITH LOCAL TERNARY PATTERN

A New DCT based Color Video Watermarking using Luminance Component

Transcription:

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING 1 NADIA IDRISSI, 2 AHMED ROUKHE 1,2 Faculty of Sciences Moulay Ismail Univerity Meknes, LAMPE Laboratory, Department of physics E-mail: 1 idrissi.nadia@ymail.com, 2 a-roukhe@yahoo.fr ABSTRACT During the last few years, the copyright in multimedia world is becoming a real concern especially with the increase in transfer files, documents over networks. These data are actually very easy to hack: information becomes vulnerable to interception, copying, tampering or corruption. To meet this need, digital watermarking is a method of signal processing which inserted into a digital document an invisible watermark, containing a code robust against any attack that can affect the watermarked data. In this paper we presented a method of digital image watermarking based on contourlet transform and maximum entropy. Keywords: Contourlet Transform; Entropy; PSNR; NC 1. INTRODUCTION The network growth and increased transmission of digital data on Internet has evolved the risk of computer hacking. The data are transferred without a protection that make them secure. This sometimes prevents users to limit their data transfer. To solve this problem, we must use techniques and methods that enable users to protect and mark their data. Watermarking is a method to insert a secret message in data such as files, images and videos. This protects the intellectual properties of these data [1]. The insertion method should be imperceptible to not detect the existence of a message; it should be robust against all conventional or geometrical attacks, as it must have a maximum amount of information that is inserted [2]. Watermarking methods can be applied in various domain of digital image processing as the spatial domain, frequency domain, and multidirectional domain. For this we will propose a method of watermarking that present a scheme in multi-directional domain to ensure a very strong robustness against several attacks. For that this paper will be organized as follows. Section 2 illustrates the decomposition techniques of images processing. Section 3 presents the proposed approach for watermarking scheme in detail. Section 4 clarifies experiment results as well as some discussions. Conclusions are given in section 5. 2. DECOMPOSITION TECHNIQUES OF IMAGES PROCESSING 2.1 Discrete Contourlet Transform The Contourlet Transform (CT) is a geometrical image- based transform [3]. It s a multi resolution and multidirectional transformation technique that is used in image analysis for capturing contours and fine details in images [4]. Contourlet transform offers multi- scale decomposition of the image; this is obtained by using Laplacian Pyramid (LP). LP is first used to capture point discontinuities (Figure1) It is then followed by a directional filter bank (DFB) to link point discontinuities into linear structures [5] and to capture the high-frequency content like smooth contours and directional edges. Figure1. Contourlet filter Bank. 637

The LP decomposition at each level generates a down sampled lowpass version of the original and the difference between the original and the prediction, resulting in a bandpass image. Figure 2 shows this process, where H and G are called analysis and synthesis filters respectively and M is the sampling matrix [6]. Figure4. Contourlet decomposition of Lena. 2.2 ENTROPY Entropy is a statistical measure of randomness that can be used to characterize the texture of the input image. Entropy is defined as: E=-sum(p.*log2(p)) Figure2. Laplacian Pyramid Scheme (A) Analysis And (B) Reconstruction. The bandpass image obtained in the LP decomposition is further processed by a DFB. A DFB is designed to capture the high-frequency content like smooth contours and directional edges [7, 8]. The DFB is efficiently implemented via a K- level binary tree decomposition that leads to 2K subbands with wedge-shaped frequency partitioning as shown in Figure 3. The contourlet decomposition is illustrated by using the Lena test image of size 512 512 and its decomposition into four levels, in Figure 4. At each successive level, the number of directional subbands is 2, 4, 8, and 16 [8]. Where p contains the histogram counts returned from imhist. By default, entropy uses two bins for logical arrays and 256 bins for uint8, uint16, or double arrays. [9-11]. 3. PROPOSED METHOD In this paper, contourlet and SVD based transform technique is proposed for watermarking of gray scale image along with binary watermark logo. The robustness and imperceptibility of watermarked image is increased by selecting specifics blocks which have the maximum entropy value. And is tested for two quantifiers such as PSNR. 3.1 Watermark embedding process The embedding process is divided into following steps and is briefly described as bellow: Step 1: Apply contourlet transform on the original image; Apply contourlet transform on the watermark. Step 2: extration of coefficients with different orientations. Step 3: division of each orientation in blocks of same sizes, Figure3. Laplacian Pyramid Scheme (A) Analysis And (B) Reconstruction. Step 4: modify the original image with watermark such that: Sθ = Iθ + αwθ Step 5: Apply inverse Contourlet Transform θ=0, π/2, π/4 and 3π/4 Step 7: obtain the watermarked image. 638

This scheme resumed the steps of embedding process Original image I Step 1 Watermark The robustness is tested under 9 types of attacks: Salt and pepper, Gaussian noise, median filtering, resizing, contrast adjustment, JPEG compression, cropping, and rotation, Histogram equalization. The original image considered for the experimentation is Lena. The watermark image is a logo as shown in Figure 6. Figure7 indicates that visual appearance of the watermarked image is good with a PSNR of 60.5446 Db. Step 2 I1 I3 I2 I4 Step 3 W3 W1 W4 W2 Figure6. Original watermark, extracted watermark Step 4 Sθ = Iθ + αwθ θ=0, π/2, π/4 and 3π/4 Step 5 Figure7. Original image, watermarked image To improve the performance of our proposed method we have used other different standard images test. Apply inverse Contourlet Step 6 Watermarked Image Figure5. Watermark Embedding Camerama Figure8. Images of test Jetplane The metric used to assess the performance of the proposed algorithm is PSNR. The results of different attacks of lena image are presented in figures as bellow: 4. EXPERIMENTAL RESULTS 639

Journal of Theoretical and Applied Information Technology 30th September 2014. Vol. 67 No.3 2005-2014 JATIT & LLS. All rights reserved. ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195 Resizing PSNR=20.2872dB PSNR= 11.1127dB Rotation (200) Contrast adjustement PSNR=29.2389dB PSNR= 18.7821dB JPEG QF=70 Gaussian noise PSNR=5.2673 db Histogram equalization PSNR= 25.0552dB Figure 9.Attacked watermarked image with PSNR..Extracted watermark from LH matrix. Median filtering (3x3) kernel These results are resumed in table and graphs as 640

bellow: Attacks PSNR TABLE I. PSNR Results After Various Attacks For Lena Image Attacks PSNR Without attack 60.5446 Salt and pepper noise (0.01 density) 25.1734 Rotation (20 0 ) 11.1127 Gaussian noise 18.7821 Median filtering (3x3) kernel 25.0552 Resizing 12.3331 Contrast adjustement 20.2872 Cropping 25% 12.3548 Histogram equalization 5.2673 JPEG QF=70 29.2389 TABLE II. Psnr Results After Various Attacks For Cameraman Image Attacks PSNR Without attack 61.5553 Without attack 59.3855 Salt and pepper noise (0.01 density) 24.7875 Rotation (20 0 ) 11.1127 Gaussian noise 18.3985 Median filtering (3x3) kernel 24.7139 Resizing 12.3331 Contrast adjustement 20.2872 Cropping 25% 12.1398 Histogram equalization 5.2673 JPEG QF=70 29.1782 Figures 10 and 11 shows the comparison between the variation of the PSNR value without attacks and after application of various attacks on several test images. These figures demonstrate that cameraman image has the best PSNR before applying attacksand jetplane image has the best PSNR after applying all attacks used in our approach. Salt and pepper noise (0.01 density) 25.2665 Rotation (20 0 ) 11.1127 Gaussian noise 17.2357 Median filtering (3x3) kernel 25.1372 Resizing 12.3331 Contrast adjustement 20.2872 Cropping 25% 11.0325 Histogram equalization 5.2673 JPEG QF=70 29.9965 Figure10. PSNR Variations For Different Image Without Applying Attacks TABLE III. PSNR Results After Various Attacks For Jetplane Image 641

5. CONCLUSION In this paper, we proposed a new approach for watermarking of still images based on both contourlet transform and singular value decomposition concepts. The experimental results show that this method is robust against most attacks. Thereby we can conclude that intellectual property of images is protected by our approach. Future work will focus on a more robust method that combines its characteristics with those of contourlet transform for the best results. This approach can also be extended to video and audio watermarking. REFRENCES: Figure11. PSNR Variations For Different Image With Applying Attacks [1] Natarajan Meghanathan, Lopamudra Nayak, Steganalysis algorithms for detecting the hidden information in image, audio and video cover media, International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010. [2] Mr.Manjunatha Prasad.R, Dr.Shivaprakash Koliwad, A Comprehensive Survey of Contemporary Researches in Watermarking for Copyright Protection of Digital Images, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009. [3] M. N. Do and M. Vetterli, The contourlet transform: An efficient directional multiresolution image representation, IEEE Transactions on Image Processing, vol. 14, no. 12, pp.2091 2106, 2005. [4] C.Venkata Narasimhulu & K.Satya Prasad, A hybrid watermarking scheme using contourlet transform and singular value decomposition, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.9, September 2010. [5] Minh N. Do, Member, IEEE, and Martin Vetterli,Fellow, IEEE, The Contourlet Transform: An Efficient Directional Multiresolution Image Representation, IEEE TRANSACTIONS ON IMAGE PROCESSING, Volume: 14, Issue: 12 2005. [6] Nagham S. AL-lella, Khalil I. Alsaif, Data hiding in contourlet coefficients based on their energy, J. of university of anbar for pure science : Vol.6:NO.2 : 2012. [7] Ibrahim A. El rube, Mohamad Abou El Nasr, Mostafa M. Naim, Mahmoud Farouk, Contourlet versus wavelet transform for a robust digital image watermarking technique, World academy of science, Engeneering and technology Vol:36 2009-12-21. [8] Sirvan Khalighi, Parisa Tirdad and HamidR Rabiee, A Contourlet Based Image Watermarking Scheme With High Resistance to Removal and Geometrical Attacks, EURASIP Journal on Advances in Signal Processing 2010, 2010:540723. [9] Mohamed RADOUANE, Tarik BOUJIHA, Rochdi MESSOUSSI, Nadia IDRISSI, Ahmed ROUKH, A Method of LSB substitution based on image blocks and maximum entropy, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013. 642

[10] Nadia IDRISSI, Ahmed ROUKH, Lhoussaine MASMOUDI, Mohamed RADOUANE, Rochdi MESSOUSSI, A Robust Digital Watermarking Technique using DWT-DCT and Statics blocks, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, March 2013. [11] Mohamed RADOUANE, Tarik BOUJIHA, Rochdi MESSOUSSI, Raja TOUAHNI, A ROBUST METHOD FOR DIGITAL IMAGES WATERMARKING BASED ON COMBINATION OF SVD, DWT AND DCT USING OPTIMAL BLOCK,JATIT, VOL59, No2 20 th January 2014. 643