SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 163
Digital Image Security Using Digital Watermarking
Prof.A.S.Kapse1, Sharayu Belokar2, Yogita Gorde3, Radha Rane4, Shrutika Yewtkar5
1Professor. A.S.Kapse, Dept. Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati,
Maharashtra, India.
2,3,4,5 BE student, Dept. of Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati,
Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Digital image watermarking process is definite
as to insert information of digital into digital signal. In
watermarking is defined as a technique which embeds data
into digital contents such as text, still images, video and audio
data without degrading the overall quality of the digital
media. This is an efficient solution to avoid illegal copying of
information from multimedia networks. Digital image safety
and integrity the top prioritized issue in today’s information
explosion. Watermarking is a popular technique that is used
for copyright protection and authentication. Watermark
should be robust and imperceptible. Robustness of watermark
can be explained in terms of successful recovery of watermark
from recovered content which may contain different types of
noises and compression effects. This paper presents an
overview of the various concepts and research works in the
field of image watermark authentication.
Key Words Watermarking, Spatial domain, Image
Transforms, Discrete Wavelet Transform, Discrete
Cosine Transform, Discrete Fourier Transform.
1.INTRODUCTION
A digital watermark is a kind of marker covertly embedded
in a noise-tolerant signal such as an audio, video or image
data. It is typically used to identify ownership of the
copyright of such signal. "Watermarking" is the process of
hiding digital information in a carrier signal the hidden
information should, but does not need to, contain a relation
to the carrier signal. Digital watermarks may be used to
verify the authenticity or integrity of the carrier signal or to
show the identity of its owners.
The information to be embedded in a signal is called adigital
watermark, although in some contexts the phrase digital
watermark means the difference between the watermarked
signal and the cover signal. The signal where the watermark
is to be embedded is called the host signal. A watermarking
system is usually divided into three distinct steps,
embedding, attack, and detection. In embedding, an
algorithm accepts the host and the data to be embedded,and
produces a watermarked signal.
Fig-1 General digital watermark life-cycle phases with
embedding-, attacking-, and detection and retrieval functions
Digital watermarking is the process of embedding
information, call digital signature or watermarking, into a
digital signal in a way that is difficult to remove. Digital
watermarks may be used to verify the authenticity or
integrity of the carrier signal or to show the identity of its
owners. Liketraditional watermarks, digitalwatermarksare
only perceptible under certain conditions. A watermark
attack is an attack on digital data where the presence of a
specially crafted piece of data can be detected by an attacker
without knowing the encryption key. Specialattentionhasto
be paid to the kind of attacks as they can help to develop
better watermarking techniques and defined better
benchmarks [1].
Several typesof watermarking schemes havebeenproposed
for handling different applications. Examples include
1. Copyright-related applicationswheretheembedded
watermark are robust
2. Medical, forensic, and intelligence or military
applications where the watermark are usually
fragile or semi-fragile
3. Content authentication applications where anytiny
change to the content are not acceptable, the
embedding distortion has to be compensated for
perfectly.
The watermarking algorithms are mainly classified into
spatial watermarking algorithmsandspectralwatermarking
algorithms. Spatial domain watermarking is a low level
encoding which includes only simple operations such as
edge detection, color separation, etc. Spectral domain
watermarking algorithm has high complexity but is very
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 164
robust against signal processing attacks. These Discrete
Wavelet Transform (DWT), Discrete Cosine Transform
(DCT), Discrete Fourier Transform (DFT) are different
spectral domain transform. [2]
2. CLASSIFICATION OF DIGITAL WATERMARKING
TECHNIQUE
Digitalwatermarking techniquesmay be classified in several
ways.
 Robustness
 Perceptibility
 Capacity
Robustness: A digital watermark is called robust with
respect to transformations if the embedded informationmay
be detected reliably from the marked signal. A digital
watermark is "fragile" if it fails to be detectable after the
slightest modification. It is commonly used for tamper
detection (integrityproof).Adigitalwatermarkiscalledsemi-
fragile if it resists benign transformations, but failsdetection
after malignant transformations. It is commonly are used to
detectmalignant transformationsRobustwatermarksmaybe
used in copy protection applications to carry copy and no
access control information. So the watermark is not
destroyed after some attacks and can easily detected to
provide certification.
Perception: A digital watermark is called perceptible if its
presence in the marked signal is noticeable On videos and
images, some are made transparent/translucent for
convenience for consumers due to the fact that they block
portion of the view; therefore degrading it.
Capacity: It can be defined as number of information bits a
watermark encodes within a unitoftimeorwork.Watermark
should be able to carry enough information that can
represent the uniqueness of image.
3. DIGITAL WATERMARKING TECHNIQUE
The process of embedding a watermark in a multimedia
object is termed as watermarking. Watermark can be
considered as a kind of a signature that reveals the owner of
the multimedia object. A watermarking algorithm embeds a
visible or invisible watermark in a given multimedia object.
The embedding processis guided byuse ofasecretkeywhich
decided the locations within the multimedia object (image)
where thewatermarkwould be embedded. The entiredigital
image watermarking techniques always works in two
domains either spatial domain or transform domain. The
transform domain image is represented in terms of its
frequencies; however, in spatial domain it is represented by
pixels.
3.1 Spatial Domain Watermarking Techniques
Spatial domaindigital watermarkingalgorithmsdirectlyload
the raw data into the original image. It can also be applied
using color separation. The spatial domain watermarking is
easier and its computing speed is high than transform
domain but it is less robust against attacks.
Additive watermarking: It is the direct method used in
spatial domain for embedding the watermark. It is done by
adding pseudo random noise patterntotheintensityofimage
pixels.
LeastSignificantbit: The watermarking isdonebychoosing
a subset of image pixels and substituting the LSB of each of
the chosen pixels with watermark bits. In this technique we
embed the watermark in the LSB of pixels.
 Simplicity.
 Very low computational complexity.
 Less time consuming.
3.2 Frequency Domain Watermarking Techniques
In frequency domain the watermark is embedded in the
spectral coefficient of the image. The commonly used
algorithms in frequency domain are the Discrete Cosine
Transform (DCT), Discrete Fourier Transform (DFT), and
Discrete Wavelet Transform (DWT).
DCT Domain Watermarking: DCT based watermarking
techniques are more robust compared to simple spatial
domain watermarking techniques. DCT like a Fourier
Transform, it represents data in terms of frequency space
rather than an amplitude space. DCT domain watermarking
can be categorized into Global DCT watermarking and Block
based DCT water-marking.
Steps in DCT Block Based Watermarking Algorithm.
1. Segment the image into non-overlapping blocks of
8x8
2. Apply forward DCT to each of these blocks
3. Apply some block selection criteria (e.g. HVS)
4. Apply coefficient selection criteria (e.g. highest)
5. Embed watermark by modifying the selected
coefficients.
6. Apply inverse DCT transform on each block
DWT Domain Watermarking: DWT based watermarking
schemes follow the same guidelines as DCT based schemes,
i.e. the underlying concept is the same; however, the process
to transform the image into its transform domain varies and
hence the resulting coefficients are different. Wavelet
transforms use wavelet filters to transform the image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 165
Discrete Wavelet Transform (DWT) iswidelyisusedinimage
processing applications as it encourages time-frequency
signal decompositions. Using DWT, a signal can be
decomposed into different sub-frequency bands. DWT uses
both low pass filter and high pass filter to decompose the
signal into different levels.
Magnitude of DWT coefficients is larger in the lowest bands
(LL) at each level of decomposition and is smaller for other
bands (HH, LH, HL). [3][4]
DFT Domain Watermarking: DFT domain has been
explored by researches because it offers robustness against
geometric attacks likerotation, scaling, cropping,translation
etc. In this sectionwe discusssomewatermarkingalgorithms
based on the DFT domain.
DFT of a real image is generally complex valued, DFT shows
translation invariance. Spatial shifts in the image affects the
phase representation of the image but not the magnitude
representation. [5]
DFT is also resistant to cropping because effect of cropping
leads to the blurring of spectrum. Scaling in the spatial
domain causes inverse scaling in the frequency domain.
Rotation inthe spatialdomain causesthesamerotationinthe
frequency domain. [6]
4. COMPARATIVE ANALYSIS OF DIFFERENT
WATERMARKING TECHNIQUES
The comparison between advantages and dis-advantages
of different watermarking technique is given table1. [7][8]
Table -1: Comparative Analysis of Different watermarking
techniques
Algorithm Advantages Disadvantages
DCT 1. More robust against
digital
Processing operations.
2 .Watermark cannot be
removed by any attacks
because of embedding.
Water-mark into middle
frequency coefficient.
1. Certain higher
frequency components
tend to be suppressed
during the quantization
process.
2. Block wise DCT
destroysthe invariance
properties of the sys-
tem.
3. Vulnerable to crop-
ping, scaling.
DWT 1. Higher compression
ratio which is relevant to
human perception.
2 .Allows good localization
both in time and spatial
frequency domain.
3. Vulnerable to cropping,
scaling.
1. Cost of computing
may be higher.
2. Computational
complexity is more.
3. Compression time
may be longer.
4. Noise may appear
near the edges of
image.
DFT DFT isrotation, scalingand
translation (RST).So, it is
used to recover from
geometric distortions.
1. Complex
implementations.
2 .Computing cost may
be higher.
LSB 1. Low degradation of
image quality.
2. Easy to implement and
understand.
3. High perceptual
transparency.
1. Very sensitive to
noise.
2. Vulnerable to
cropping, scaling
attacks.
3. Very less robust
against attacks.
Correlation Increases the robustness
of watermark by
increasing the gain factor.
Due to very high
increment
In gain factor, image
quality may decrease.
Patchwork .High level of robustness
against many types of at-
tacks.
Very small amount of
in-formation can be
hidden.
5. APPLICATION OF WATERMARK TECHNIQUE
Digital watermarking may be used for a wide range of
applications, such as:
1 .Copyright protection.
2. Source tracking (different recipients get differently
watermarked content).
3. Broadcast monitoring (television newsoften contains
watermarked video from international agencies).
4. Video authentication.
5. Software crippling on screen casting and videoediting
software programs, to encourage users to purchase the
full version to remove it.
6. Content management on social networks.
6. CONCLUSION
In this paper, we surveyed the various aspects for digital
watermarking techniques and its applications. A brief and
comparative analysis of watermarking techniques is also
presented which can help in the new researches in related
areas. We also classified the watermarking algorithmsbased
on spatial and transform domain. Watermarking, which
belong to the information hiding field, has seen a lot of
research interest recently. There is a lot of work begin
conducted in different branches in this field. We classify the
techniques based on different domains in which data is
embedded. Here we limit the survey to images only.
REFERENCES
[1] Hartung, F. and Kutter, M.(1999) Multimedia
Watermarking Techniques, Proc. of IEEE, Tutorial,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 166
Survey, and Special Issue on Data Hiding & Security,
pp.1079-1107.
[2] NavnidhiChaturvedi , Dr.S.J.Basha, “Comparison of
Digital Image watermarking Methods DWT &DWT-DCT
on the Basis of PSNR”, International Journal of
Innovative Research in Science, Engineering and
Technology Vol. 1, Issue 2, December 2012.
[3] Vidyasagar M. Potdar, Song Han, Elizabeth Chang,” A
Survey of Digital Image Watermarking Techniques”,3rd
IEEE International Conference on IndustrialInformatics
Aug. 2005.
[4] Lakshmi Priya C V and Nelwin Raj N R,” Digital
watermarking scheme for image authentication”,
International Conference on Communication and Signal
Processing, April 6-8, 2017, India.
[5] Pereira, S., Pun, T., "Robust Template Matching for
Affine Resistant Image Watermarks," in IEEE
Transactions on Inage Processing, vol. 9, no. 6,pp.1123-
1129, June 2000.
[6] Solachidis, V & Pitas, I 2001, 'Circularly Symmetric
Watermark Embedding in 2-D DFT Domain', in IEEE
Transactions on Itnage Processing, vol. 10, no. 11, pp.
1741-1753.
[7] Jiang Xuehua, ―Digital Watermarking and Its
Application in Image Copyright Protection‖, 2010
International Conference on Intelligent Computation
Technology and Automation.
[8] Amit Kumar Singh, Nomit Sharma, Mayank Dave, Anand
Mohan, ―A Novel Technique for Digital Image
Watermarking in Spatial Domain‖, 2012 2nd IEEE
International Conference on Parallel, Distributed and
Grid Computing.
[9] Hend A. Elsayed; Yasir Khalid Jadaan; Shawkat K.
Guirguis,” Image SecurityUsingQuantumRivest-Shamir-
Adleman Cryptosystem Algorithm and Digital
Watermarking”, Progress in Electromagnetic Research
Symposium (PIERS), Aug. 2016.
[10] Mohd Aliff Faiz bin Jeffry,Hazinah Kutty Mammi,” A
Study on Image Security in Social Media using Digital
Watermarking with Metadata”, IEEE Conference on
Application, Information and Network Security (AINS)
14 Nov. 2017
[11] U. Eze Peter; Udaya Parampalli; C. Iwuchukwu Uchechi;
Onuekwusi Nnaemeka,” Challenges and Prospects of
Blind Spread Spectrum Medical Image Watermarking”,
IEEE 3rd International Conference on Electro-
Technology for National Development(NIGERCON)Nov
2017.
[12] Ali Al-Haj, Hiba Abdel-Nabi,” Digital image security
based on data hiding and cryptography”, 3rd
International Conference on Information Management
(ICIM), April 2017.
[13] Gururaj Kulkarni, Suresh Kuri,” Robust Digital Image
Watermarking using DWT, DCT and ProbabilisticNeural
Network”, International Conference on Electrical,
Electronics, Communication, Computer and
Optimization Techniques (ICEECCOT) Dec 2017.
[14] S. Radharani Dr. M.L. Valarmathi,” A Study on
Watermarking Schemes for Image Authentication”,
International Journal of Computer Applications (0975 –
8887) Volume 2 – No.4, June 2010.
[15] Upasana Yadav, J.P.Sharma, Dinesh.Sharma, Purnima K
Sharma,” Different Watermarking Techniques & its
Applications: A Review”, International Journal of
Scientific & Engineering Research, Volume 5, Issue 4,
April-2014.
[16] Seyed Mohammad Mousavi,” Image Authentication
Scheme using Digital Signature and Digital
Watermarking”, IJCEM International Journal of
Computational Engineering & Management, Vol. 16
Issue 3, May 2013.

More Related Content

PDF
IRJET-A study of video watermarking techniques based on energy model
PDF
IRJET- Data Leakage Detection using Cloud Computing
PDF
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
PDF
A Review on Robust Digital Watermarking based on different Methods and its Ap...
PDF
Commutative approach for securing digital media
PDF
50120140504020 2
PDF
Analysis of Digital Image Watermarking and its Application
PDF
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
IRJET-A study of video watermarking techniques based on energy model
IRJET- Data Leakage Detection using Cloud Computing
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
Commutative approach for securing digital media
50120140504020 2
Analysis of Digital Image Watermarking and its Application
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...

What's hot (19)

PDF
A Brief Survey on Robust Video Watermarking Techniques
PDF
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
PDF
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
PDF
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
PDF
International Journal for Research in Applied Science & Engineering
PDF
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
PPT
robust image watermarking
PDF
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
PDF
I43014752
PDF
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
PDF
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
PDF
50120140506015
PDF
A Survey on Video Watermarking Technologies based on Copyright Protection and...
PDF
Protection of Multispectral Images using Watermarking and Encryption
PPT
Intro Watermarking
PDF
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
DOC
Generic lossless visible watermarking—a
A Brief Survey on Robust Video Watermarking Techniques
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
International Journal for Research in Applied Science & Engineering
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
robust image watermarking
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
I43014752
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
50120140506015
A Survey on Video Watermarking Technologies based on Copyright Protection and...
Protection of Multispectral Images using Watermarking and Encryption
Intro Watermarking
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
International Journal of Computational Engineering Research(IJCER)
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
Generic lossless visible watermarking—a
Ad

Similar to Digital Image Security using Digital Watermarking (20)

PDF
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
PDF
Jq3417501753
PDF
Ah04605234238
PDF
IRJET- Survey of Digital Watermarking Techniques and its Application
PDF
Comparative Analysis of DCT and DWT based novel methods for Watermarking
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
PDF
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
PDF
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
PDF
Report on Digital Watermarking Technology
PDF
Comparison of Invisible Digital Watermarking Techniques for its Robustness
PDF
Digital video watermarking scheme using discrete wavelet transform and standa...
PDF
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
PDF
IRJET- An Efficient and Robust Approach for Relational Databases Watermarking
PDF
Ki2417591763
PDF
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
PDF
B011110614
PDF
A Quick Glance over the Digital Watermarking
PDF
1709 1715
PDF
1709 1715
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
Jq3417501753
Ah04605234238
IRJET- Survey of Digital Watermarking Techniques and its Application
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
Report on Digital Watermarking Technology
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Digital video watermarking scheme using discrete wavelet transform and standa...
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
IRJET- An Efficient and Robust Approach for Relational Databases Watermarking
Ki2417591763
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
B011110614
A Quick Glance over the Digital Watermarking
1709 1715
1709 1715
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
composite construction of structures.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PPT on Performance Review to get promotions
PPTX
web development for engineering and engineering
PPTX
Construction Project Organization Group 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
additive manufacturing of ss316l using mig welding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CH1 Production IntroductoryConcepts.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
composite construction of structures.pdf
bas. eng. economics group 4 presentation 1.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT on Performance Review to get promotions
web development for engineering and engineering
Construction Project Organization Group 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)
Lecture Notes Electrical Wiring System Components
additive manufacturing of ss316l using mig welding
Embodied AI: Ushering in the Next Era of Intelligent Systems
CH1 Production IntroductoryConcepts.pptx

Digital Image Security using Digital Watermarking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 163 Digital Image Security Using Digital Watermarking Prof.A.S.Kapse1, Sharayu Belokar2, Yogita Gorde3, Radha Rane4, Shrutika Yewtkar5 1Professor. A.S.Kapse, Dept. Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. 2,3,4,5 BE student, Dept. of Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Digital image watermarking process is definite as to insert information of digital into digital signal. In watermarking is defined as a technique which embeds data into digital contents such as text, still images, video and audio data without degrading the overall quality of the digital media. This is an efficient solution to avoid illegal copying of information from multimedia networks. Digital image safety and integrity the top prioritized issue in today’s information explosion. Watermarking is a popular technique that is used for copyright protection and authentication. Watermark should be robust and imperceptible. Robustness of watermark can be explained in terms of successful recovery of watermark from recovered content which may contain different types of noises and compression effects. This paper presents an overview of the various concepts and research works in the field of image watermark authentication. Key Words Watermarking, Spatial domain, Image Transforms, Discrete Wavelet Transform, Discrete Cosine Transform, Discrete Fourier Transform. 1.INTRODUCTION A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as an audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal the hidden information should, but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. The information to be embedded in a signal is called adigital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded,and produces a watermarked signal. Fig-1 General digital watermark life-cycle phases with embedding-, attacking-, and detection and retrieval functions Digital watermarking is the process of embedding information, call digital signature or watermarking, into a digital signal in a way that is difficult to remove. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. Liketraditional watermarks, digitalwatermarksare only perceptible under certain conditions. A watermark attack is an attack on digital data where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key. Specialattentionhasto be paid to the kind of attacks as they can help to develop better watermarking techniques and defined better benchmarks [1]. Several typesof watermarking schemes havebeenproposed for handling different applications. Examples include 1. Copyright-related applicationswheretheembedded watermark are robust 2. Medical, forensic, and intelligence or military applications where the watermark are usually fragile or semi-fragile 3. Content authentication applications where anytiny change to the content are not acceptable, the embedding distortion has to be compensated for perfectly. The watermarking algorithms are mainly classified into spatial watermarking algorithmsandspectralwatermarking algorithms. Spatial domain watermarking is a low level encoding which includes only simple operations such as edge detection, color separation, etc. Spectral domain watermarking algorithm has high complexity but is very
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 164 robust against signal processing attacks. These Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) are different spectral domain transform. [2] 2. CLASSIFICATION OF DIGITAL WATERMARKING TECHNIQUE Digitalwatermarking techniquesmay be classified in several ways.  Robustness  Perceptibility  Capacity Robustness: A digital watermark is called robust with respect to transformations if the embedded informationmay be detected reliably from the marked signal. A digital watermark is "fragile" if it fails to be detectable after the slightest modification. It is commonly used for tamper detection (integrityproof).Adigitalwatermarkiscalledsemi- fragile if it resists benign transformations, but failsdetection after malignant transformations. It is commonly are used to detectmalignant transformationsRobustwatermarksmaybe used in copy protection applications to carry copy and no access control information. So the watermark is not destroyed after some attacks and can easily detected to provide certification. Perception: A digital watermark is called perceptible if its presence in the marked signal is noticeable On videos and images, some are made transparent/translucent for convenience for consumers due to the fact that they block portion of the view; therefore degrading it. Capacity: It can be defined as number of information bits a watermark encodes within a unitoftimeorwork.Watermark should be able to carry enough information that can represent the uniqueness of image. 3. DIGITAL WATERMARKING TECHNIQUE The process of embedding a watermark in a multimedia object is termed as watermarking. Watermark can be considered as a kind of a signature that reveals the owner of the multimedia object. A watermarking algorithm embeds a visible or invisible watermark in a given multimedia object. The embedding processis guided byuse ofasecretkeywhich decided the locations within the multimedia object (image) where thewatermarkwould be embedded. The entiredigital image watermarking techniques always works in two domains either spatial domain or transform domain. The transform domain image is represented in terms of its frequencies; however, in spatial domain it is represented by pixels. 3.1 Spatial Domain Watermarking Techniques Spatial domaindigital watermarkingalgorithmsdirectlyload the raw data into the original image. It can also be applied using color separation. The spatial domain watermarking is easier and its computing speed is high than transform domain but it is less robust against attacks. Additive watermarking: It is the direct method used in spatial domain for embedding the watermark. It is done by adding pseudo random noise patterntotheintensityofimage pixels. LeastSignificantbit: The watermarking isdonebychoosing a subset of image pixels and substituting the LSB of each of the chosen pixels with watermark bits. In this technique we embed the watermark in the LSB of pixels.  Simplicity.  Very low computational complexity.  Less time consuming. 3.2 Frequency Domain Watermarking Techniques In frequency domain the watermark is embedded in the spectral coefficient of the image. The commonly used algorithms in frequency domain are the Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), and Discrete Wavelet Transform (DWT). DCT Domain Watermarking: DCT based watermarking techniques are more robust compared to simple spatial domain watermarking techniques. DCT like a Fourier Transform, it represents data in terms of frequency space rather than an amplitude space. DCT domain watermarking can be categorized into Global DCT watermarking and Block based DCT water-marking. Steps in DCT Block Based Watermarking Algorithm. 1. Segment the image into non-overlapping blocks of 8x8 2. Apply forward DCT to each of these blocks 3. Apply some block selection criteria (e.g. HVS) 4. Apply coefficient selection criteria (e.g. highest) 5. Embed watermark by modifying the selected coefficients. 6. Apply inverse DCT transform on each block DWT Domain Watermarking: DWT based watermarking schemes follow the same guidelines as DCT based schemes, i.e. the underlying concept is the same; however, the process to transform the image into its transform domain varies and hence the resulting coefficients are different. Wavelet transforms use wavelet filters to transform the image.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 165 Discrete Wavelet Transform (DWT) iswidelyisusedinimage processing applications as it encourages time-frequency signal decompositions. Using DWT, a signal can be decomposed into different sub-frequency bands. DWT uses both low pass filter and high pass filter to decompose the signal into different levels. Magnitude of DWT coefficients is larger in the lowest bands (LL) at each level of decomposition and is smaller for other bands (HH, LH, HL). [3][4] DFT Domain Watermarking: DFT domain has been explored by researches because it offers robustness against geometric attacks likerotation, scaling, cropping,translation etc. In this sectionwe discusssomewatermarkingalgorithms based on the DFT domain. DFT of a real image is generally complex valued, DFT shows translation invariance. Spatial shifts in the image affects the phase representation of the image but not the magnitude representation. [5] DFT is also resistant to cropping because effect of cropping leads to the blurring of spectrum. Scaling in the spatial domain causes inverse scaling in the frequency domain. Rotation inthe spatialdomain causesthesamerotationinthe frequency domain. [6] 4. COMPARATIVE ANALYSIS OF DIFFERENT WATERMARKING TECHNIQUES The comparison between advantages and dis-advantages of different watermarking technique is given table1. [7][8] Table -1: Comparative Analysis of Different watermarking techniques Algorithm Advantages Disadvantages DCT 1. More robust against digital Processing operations. 2 .Watermark cannot be removed by any attacks because of embedding. Water-mark into middle frequency coefficient. 1. Certain higher frequency components tend to be suppressed during the quantization process. 2. Block wise DCT destroysthe invariance properties of the sys- tem. 3. Vulnerable to crop- ping, scaling. DWT 1. Higher compression ratio which is relevant to human perception. 2 .Allows good localization both in time and spatial frequency domain. 3. Vulnerable to cropping, scaling. 1. Cost of computing may be higher. 2. Computational complexity is more. 3. Compression time may be longer. 4. Noise may appear near the edges of image. DFT DFT isrotation, scalingand translation (RST).So, it is used to recover from geometric distortions. 1. Complex implementations. 2 .Computing cost may be higher. LSB 1. Low degradation of image quality. 2. Easy to implement and understand. 3. High perceptual transparency. 1. Very sensitive to noise. 2. Vulnerable to cropping, scaling attacks. 3. Very less robust against attacks. Correlation Increases the robustness of watermark by increasing the gain factor. Due to very high increment In gain factor, image quality may decrease. Patchwork .High level of robustness against many types of at- tacks. Very small amount of in-formation can be hidden. 5. APPLICATION OF WATERMARK TECHNIQUE Digital watermarking may be used for a wide range of applications, such as: 1 .Copyright protection. 2. Source tracking (different recipients get differently watermarked content). 3. Broadcast monitoring (television newsoften contains watermarked video from international agencies). 4. Video authentication. 5. Software crippling on screen casting and videoediting software programs, to encourage users to purchase the full version to remove it. 6. Content management on social networks. 6. CONCLUSION In this paper, we surveyed the various aspects for digital watermarking techniques and its applications. A brief and comparative analysis of watermarking techniques is also presented which can help in the new researches in related areas. We also classified the watermarking algorithmsbased on spatial and transform domain. Watermarking, which belong to the information hiding field, has seen a lot of research interest recently. There is a lot of work begin conducted in different branches in this field. We classify the techniques based on different domains in which data is embedded. Here we limit the survey to images only. REFERENCES [1] Hartung, F. and Kutter, M.(1999) Multimedia Watermarking Techniques, Proc. of IEEE, Tutorial,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 166 Survey, and Special Issue on Data Hiding & Security, pp.1079-1107. [2] NavnidhiChaturvedi , Dr.S.J.Basha, “Comparison of Digital Image watermarking Methods DWT &DWT-DCT on the Basis of PSNR”, International Journal of Innovative Research in Science, Engineering and Technology Vol. 1, Issue 2, December 2012. [3] Vidyasagar M. Potdar, Song Han, Elizabeth Chang,” A Survey of Digital Image Watermarking Techniques”,3rd IEEE International Conference on IndustrialInformatics Aug. 2005. [4] Lakshmi Priya C V and Nelwin Raj N R,” Digital watermarking scheme for image authentication”, International Conference on Communication and Signal Processing, April 6-8, 2017, India. [5] Pereira, S., Pun, T., "Robust Template Matching for Affine Resistant Image Watermarks," in IEEE Transactions on Inage Processing, vol. 9, no. 6,pp.1123- 1129, June 2000. [6] Solachidis, V & Pitas, I 2001, 'Circularly Symmetric Watermark Embedding in 2-D DFT Domain', in IEEE Transactions on Itnage Processing, vol. 10, no. 11, pp. 1741-1753. [7] Jiang Xuehua, ―Digital Watermarking and Its Application in Image Copyright Protection‖, 2010 International Conference on Intelligent Computation Technology and Automation. [8] Amit Kumar Singh, Nomit Sharma, Mayank Dave, Anand Mohan, ―A Novel Technique for Digital Image Watermarking in Spatial Domain‖, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing. [9] Hend A. Elsayed; Yasir Khalid Jadaan; Shawkat K. Guirguis,” Image SecurityUsingQuantumRivest-Shamir- Adleman Cryptosystem Algorithm and Digital Watermarking”, Progress in Electromagnetic Research Symposium (PIERS), Aug. 2016. [10] Mohd Aliff Faiz bin Jeffry,Hazinah Kutty Mammi,” A Study on Image Security in Social Media using Digital Watermarking with Metadata”, IEEE Conference on Application, Information and Network Security (AINS) 14 Nov. 2017 [11] U. Eze Peter; Udaya Parampalli; C. Iwuchukwu Uchechi; Onuekwusi Nnaemeka,” Challenges and Prospects of Blind Spread Spectrum Medical Image Watermarking”, IEEE 3rd International Conference on Electro- Technology for National Development(NIGERCON)Nov 2017. [12] Ali Al-Haj, Hiba Abdel-Nabi,” Digital image security based on data hiding and cryptography”, 3rd International Conference on Information Management (ICIM), April 2017. [13] Gururaj Kulkarni, Suresh Kuri,” Robust Digital Image Watermarking using DWT, DCT and ProbabilisticNeural Network”, International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT) Dec 2017. [14] S. Radharani Dr. M.L. Valarmathi,” A Study on Watermarking Schemes for Image Authentication”, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.4, June 2010. [15] Upasana Yadav, J.P.Sharma, Dinesh.Sharma, Purnima K Sharma,” Different Watermarking Techniques & its Applications: A Review”, International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014. [16] Seyed Mohammad Mousavi,” Image Authentication Scheme using Digital Signature and Digital Watermarking”, IJCEM International Journal of Computational Engineering & Management, Vol. 16 Issue 3, May 2013.