SlideShare a Scribd company logo
The International Journal Of Engineering And Science (IJES)
||Volume||2 ||Issue|| 10||Pages|| 23-26||2013||
ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805

A Singular Value Decomposition and Wavelet Based Robust
Watermarking Scheme
N.Tirumala1, B.Veeresh Kumar2, T.Sravanthi 3
1

P.G. Student, Department of Electronics and communication, VBIT college, Andhra Pradesh.
Assistant Professor, Department of Electronics and communication, VBIT college, Andhra Pradesh.
3
Assistant Professor, Department of Electronics and communication, VBIT college, Andhra Pradesh.
2

--------------------------------------------------------ABSTRACT-------------------------------------------------This paper presents a robust watermarking technique using discrete wavelet transform and Singular Value
Decomposition. In proposed method the blue channel of the color host image is selected for embedding
watermark because it is more resistant to changes compared to red and green channels, for embedding
watermark singular values are used. In this the watermark is embedded into singular values of the host image.
They embedded the singular values of the watermark image into the singular values of the host image. The blue
channel is decomposed into n levels using discrete wavelet transform because this is an invertible transform and
has the property of exact reconstruction and smoothness. This method is shown to be robust against many signal
processing operations as well as geometrical attacks.
KEY WORDS: Attacks, Copyright Protection, Digital Image Watermarking, Discrete Wavelets Transform,
Robust Watermarking, Singular Value Decomposition.

-------------------------------------------------------------------------------------------------------------------------Date of Submission:. 1 November, 2013
Date of Acceptance: 20 November 2013
--------------------------------------------------------------------------------------------------------------------------I . INTRODUCTION
With the growth of the Internet and the immediate availability of computing resources to everyone,
“digitized property” can be reproduced and instantaneously distributed without loss of quality at basically no
cost. Until now, intellectual property and value has always been bound to some physical container that could not
be easily duplicated, there by guaranteeing that the creator benefits from his work. Clearly, there is business like
the music or photography industry that cannot adopt this paradigm since they trade basic content and therefore
have to stick with traditional copyright enforcement to guarantee income. As audio, video and other works
become available in digital form, it may be that the ease with which perfect copies can be made will lead to
large-scale unauthorized copying which will undermine the music, film, book and software publishing
industries. The rapid evolution of digital technology makes the development of reliable and robust schemes for
protecting digital still images, audio and video from piracy a matter of urgency. The use of digitally formatted
image and video information is rapidly increasing with the development of multimedia broadcasting, network
databases and electronic publishing. This evolution provides many advantages such as easy, fast and
inexpensive duplication of products. However, it also increases the potential for unauthorized distribution of
such information, and significantly increases the problems associated with enforcing
Copyright protection.

II . 2D DISCRETE WAVELET TRANSFORM
The 2D DWT is computed by performing low-pass and high pass filtering of the image pixels as shown
in Figure 1. In this figure, the low-pass and high-pass filters are denoted by h (n) and g (n), respectively. This
figure depicts the one level of the 2D DWT decomposition. At each level, the high-pass filter generates detailed
image pixel information, while the low-pass filter produces the coarse approximations of the input image. At the
end of each low-pass and high-pass filtering, the outputs are down-sampled by two (↓ 2). In order to compute
2D DWT, 1D DWT is applied twice in both horizontal and vertical dimension. In other words, a 2D DWT can
be performed by first performing a 1D DWT on each row, which is referred to as horizontal filtering, of the
image followed by a 1D DWT on each column, which is called vertical filtering as shown in figure 1.

www.theijes.com

The IJES

Page 23
A Singular Value Decomposition and Wavelet…

Fig.1. One level 2D DWT decomposition of an input image using filtering approach

Fig.2. Two level 2D Wavelet based transforms
The higher level sub bands are more significant than the lower level sub bands. They contain most of
the energy coefficients so embedded in higher level sub bands is providing more robustness. On the other hand
lower level sub bands have minor energy coefficients so watermark in these sub bands are defenseless to
attacks. The higher level approximation sub band (LL2 sub band) is not suitable for embedding a watermark
since it is a low-frequency band that contains important information about an image and easily causes image
distortions. In second level, embedding a watermark in the diagonal sub band (HH2 sub band) is also not
suitable, since the sub band can easily be eliminated, for example by lossy compression as it has minor energy
coefficient. So the middle frequency sub bands (Vertical & Horizontal) of higher level are the best choice for
embedding. Further the LH2 sub band has more significant coefficients than the HL2 sub band.

III PERFORMANCE EVALUATION
Peak Signal-to-Noise Ratio (PSNR): It is the ratio between the maximum possible power of a signal
and the power of corrupting noise the affects the fidelity of its representation. It is the most easily defined via
the Mean Squared Error (MSE) which for two m x n images I and K where one of the images is considered as a
noisy approximation of the other. MSE and PSNR can be estimated below equations.
(1)
……… (2)

IV PROPOSED WATERMARKING METHOD
In embedding process, first separate the R, G & B channels of the color image and the blue channel is
selected for the embedding because this channel is more resistant to changes compared to red and green
channels and the human eye is less sensitive to the blue channel, a perceptually invisible watermark embedded
in the blue channel can contain more energy than a perceptually invisible watermark embedded in the luminance
channel of a color image. The blue channel is decomposed into n-level using discrete wavelet transform
Let select a bmp image of size 128 x 128 as watermark and convert it into a 1-D vector, for embedding
watermark bit 0 & 1 in mid frequency sub bands of higher level decomposition of the channel. Finally
reconstruct the watermarked image using inverse discrete wavelet transform. Now calculate the Mean Squared
Error & Peak Signal to Noise Ratio between original host image and watermarked image to evaluate the
perceptual Similarity between these two images by using equation 1 & 2.
In extraction process the end user separates the R, G & B channels of the watermarked image. The blue
channel is decomposed into n-level using discrete wavelet transform.

www.theijes.com

The IJES

Page 24
A Singular Value Decomposition and Wavelet…
V SINGULAR VALUE DECOMPOSITION
SVD is a Mathematical tool used to analyze matrices. In this a square matrix is decomposed into three
matrices of same size. A real matrix A of size NxN can be decomposed into a product of three matrices.
A= USVT
Where U and V are left singular and right singulars vectors of A and S is diagonal matrix.
For calculating singular values, we need to find DET of the matrix, Eigen values, Eigen vectors and
inverse transform after that we can get the singular values. SVD is having so many properties like Orthogonal
matrices, Scaling property, The Stability of singular values, Rotation and translation invariance.
VI EXPERIMENTAL RESULTS
Baby.jpg color image of size 256X256 is selected as a host and best.bmp bitmap image of size
128X128 is chosen as a watermark. Figure 3 shows the original host image & l-Level decomposed blue channel
using discrete wavelet transform. In Figure 4 host image, watermark, watermarked and extracted watermark on
the receiver side is shown.

Fig.3. Original host image & decomposed blue channel using wavelet transform

Fig.4. Original host image, original watermark, watermarked image and extracted watermark

Fig.5 shows watermarked image at a different embedding factors for
(a) α =0.1, MSE=0.0023,PSNR=74.4430.
(b) α =0.5, MSE= 0.0224, PSNR=64.6298.
(c) α =0.01, MSE= 2.3376, PSNR=94.4430.
The performance of the proposed method is tested by applying different geometric and image
processing attacks, such as salt and pepper noise, Random noise, Rotation, Additive Gaussian noise, Gamma,
Blurring and Motion Blurring attack.

www.theijes.com

The IJES

Page 25
A Singular Value Decomposition and Wavelet…
Table1. Shows the different attacks performed in this paper.
Attack
Blurring
Salt & Pepper
Random Noise
AWGN
Motion blurring
Rotation
Gamma

PSNR
78.6082
78.4430
76.5514
78.3875
74.4430
76.5514
94.4430

VII. CONCLUSION
In this paper a new robust watermarking technique for copyright protection has been proposed. We
applied the singular value decomposition along with the Discrete Wavelet Transform. Since the technique
utilizes the properties of both DWT and SVD the proposed technique is more robust against different attacks.
The innovation of this paper is that the security of the algorithm is increased with the on the watermark image.
The robustness of the technique is justified by giving analysis of the effect of attacks and still we are able to get
good visual quality of the embedded watermark. The performance of the proposed method is tested by applying
different geometric and image processing attacks, such as salt and pepper noise, Random noise, Rotation,
Additive Gaussian noise, Blurring and Motion Blurring attack. The proposed method, with stands for all these
attacks.
Future Scope:
The watermark embedding scheme can be extended to include encrypted watermarks. Watermark
extraction algorithm can be extracted to perform watermark validation automatically. Suitable feature extraction
& matching techniques have to be explored. In case of the progressive image transmission the schemes for
optimizing the data for each phase needs to be studied. The phase wise data compression & decompression
schemes need to be evaluated.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]

C.Venkata Narsimhulu and K.Satya Prasad, “A hybrid watermarking scheme using contourlet transform and singular value
decomposition”, IJCSNS International Journal of Network security, VOL.10 No.9, September 2010.
Ibrahim Nasir, Ying Weng and Jianmin Jiang, “New Robust Watermarking Scheme for color image in spatial Domain”,
University of Bradford, UK.
Gonzalez, F.P., and J.R., Hernandez, 1998. “A tutorial on digital Watermarking”, Tech. Rep., University of Vigo, Spain.
J. J. K. Ó Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” Proceedings of
the IEEE, Vision, Image and Signal Processing, vol. 143, pp. 250–256, Aug. 1996.
R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc. 1996 Int. Conference on Image Processing, Lausanne,
Switzerland, Sept. 1996, vol. 3, pp. 219–222.
S. Kay and E. Izquierdo, “Robust content based image watermarking,” in Proc. Workshop on Image Analysis for Multimedia
Interactive Services, WIAMIS’ 2001, Tampere, Finland, May 2001.
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image
Processing, vol. 6, pp. 1673–1687, Dec. 1997.

www.theijes.com

The IJES

Page 26

More Related Content

PDF
Labview with dwt for denoising the blurred biometric images
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
PDF
International journal of signal and image processing issues vol 2015 - no 1...
PPTX
DCT based Image Watermarking
PDF
Is2415291534
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
Curved Wavelet Transform For Image Denoising using MATLAB.
Labview with dwt for denoising the blurred biometric images
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
International journal of signal and image processing issues vol 2015 - no 1...
DCT based Image Watermarking
Is2415291534
International Journal of Engineering Research and Development (IJERD)
Curved Wavelet Transform For Image Denoising using MATLAB.

What's hot (18)

PDF
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
PDF
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
PDF
Architectural implementation of video compression
PDF
Multiple Binary Images Watermarking in Spatial and Frequency Domains
PPT
Chapter01 (2)
DOCX
final_project
PDF
PDF
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
PDF
Lect2 scan convertinglines
PDF
Image denosing in underwater acoustic noise using discrete wavelet transform ...
PDF
A Review on Image Denoising using Wavelet Transform
PDF
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
PDF
Paper id 212014133
PDF
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
PDF
Digital image compression techniques
PDF
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
PPTX
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
PPTX
Introduction to Image Compression
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
Architectural implementation of video compression
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Chapter01 (2)
final_project
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Lect2 scan convertinglines
Image denosing in underwater acoustic noise using discrete wavelet transform ...
A Review on Image Denoising using Wavelet Transform
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
Paper id 212014133
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
Digital image compression techniques
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Introduction to Image Compression
Ad

Viewers also liked (19)

PDF
The International Journal of Engineering and Science (The IJES)
PDF
C03406021027
PDF
C03401016021
PDF
F03401035041
PDF
The International Journal of Engineering and Science (The IJES)
PDF
A03404001007
PDF
E03406032034
PDF
E03403027030
PDF
The International Journal of Engineering and Science (The IJES)
PDF
The International Journal of Engineering and Science (The IJES)
PDF
The International Journal of Engineering and Science (The IJES)
PDF
H03405059069
PDF
The International Journal of Engineering and Science (The IJES)
PDF
The International Journal of Engineering and Science (The IJES)
PDF
F03402042047
PDF
F03404033046
PDF
I03405070076
PDF
A03401001005
PDF
J03405077089
The International Journal of Engineering and Science (The IJES)
C03406021027
C03401016021
F03401035041
The International Journal of Engineering and Science (The IJES)
A03404001007
E03406032034
E03403027030
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
H03405059069
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
F03402042047
F03404033046
I03405070076
A03401001005
J03405077089
Ad

Similar to The International Journal of Engineering and Science (The IJES) (20)

PDF
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
PDF
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
PDF
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
PDF
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
PDF
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
PDF
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
PDF
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
PDF
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
PDF
Ijetcas14 528
PDF
B011110614
PDF
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
PDF
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
PDF
A0360105
PDF
1918 1923
PDF
1918 1923
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
PDF
Psnr value of digital image watermarking by using
PDF
Hybrid Approach for Robust Digital Video Watermarking
PDF
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
Hybrid Method For Image Watermarking Using 2 Level LWT-Walsh Transform-SVD in...
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
Ijetcas14 528
B011110614
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A0360105
1918 1923
1918 1923
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
Psnr value of digital image watermarking by using
Hybrid Approach for Robust Digital Video Watermarking
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx

The International Journal of Engineering and Science (The IJES)

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 10||Pages|| 23-26||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 A Singular Value Decomposition and Wavelet Based Robust Watermarking Scheme N.Tirumala1, B.Veeresh Kumar2, T.Sravanthi 3 1 P.G. Student, Department of Electronics and communication, VBIT college, Andhra Pradesh. Assistant Professor, Department of Electronics and communication, VBIT college, Andhra Pradesh. 3 Assistant Professor, Department of Electronics and communication, VBIT college, Andhra Pradesh. 2 --------------------------------------------------------ABSTRACT-------------------------------------------------This paper presents a robust watermarking technique using discrete wavelet transform and Singular Value Decomposition. In proposed method the blue channel of the color host image is selected for embedding watermark because it is more resistant to changes compared to red and green channels, for embedding watermark singular values are used. In this the watermark is embedded into singular values of the host image. They embedded the singular values of the watermark image into the singular values of the host image. The blue channel is decomposed into n levels using discrete wavelet transform because this is an invertible transform and has the property of exact reconstruction and smoothness. This method is shown to be robust against many signal processing operations as well as geometrical attacks. KEY WORDS: Attacks, Copyright Protection, Digital Image Watermarking, Discrete Wavelets Transform, Robust Watermarking, Singular Value Decomposition. -------------------------------------------------------------------------------------------------------------------------Date of Submission:. 1 November, 2013 Date of Acceptance: 20 November 2013 --------------------------------------------------------------------------------------------------------------------------I . INTRODUCTION With the growth of the Internet and the immediate availability of computing resources to everyone, “digitized property” can be reproduced and instantaneously distributed without loss of quality at basically no cost. Until now, intellectual property and value has always been bound to some physical container that could not be easily duplicated, there by guaranteeing that the creator benefits from his work. Clearly, there is business like the music or photography industry that cannot adopt this paradigm since they trade basic content and therefore have to stick with traditional copyright enforcement to guarantee income. As audio, video and other works become available in digital form, it may be that the ease with which perfect copies can be made will lead to large-scale unauthorized copying which will undermine the music, film, book and software publishing industries. The rapid evolution of digital technology makes the development of reliable and robust schemes for protecting digital still images, audio and video from piracy a matter of urgency. The use of digitally formatted image and video information is rapidly increasing with the development of multimedia broadcasting, network databases and electronic publishing. This evolution provides many advantages such as easy, fast and inexpensive duplication of products. However, it also increases the potential for unauthorized distribution of such information, and significantly increases the problems associated with enforcing Copyright protection. II . 2D DISCRETE WAVELET TRANSFORM The 2D DWT is computed by performing low-pass and high pass filtering of the image pixels as shown in Figure 1. In this figure, the low-pass and high-pass filters are denoted by h (n) and g (n), respectively. This figure depicts the one level of the 2D DWT decomposition. At each level, the high-pass filter generates detailed image pixel information, while the low-pass filter produces the coarse approximations of the input image. At the end of each low-pass and high-pass filtering, the outputs are down-sampled by two (↓ 2). In order to compute 2D DWT, 1D DWT is applied twice in both horizontal and vertical dimension. In other words, a 2D DWT can be performed by first performing a 1D DWT on each row, which is referred to as horizontal filtering, of the image followed by a 1D DWT on each column, which is called vertical filtering as shown in figure 1. www.theijes.com The IJES Page 23
  • 2. A Singular Value Decomposition and Wavelet… Fig.1. One level 2D DWT decomposition of an input image using filtering approach Fig.2. Two level 2D Wavelet based transforms The higher level sub bands are more significant than the lower level sub bands. They contain most of the energy coefficients so embedded in higher level sub bands is providing more robustness. On the other hand lower level sub bands have minor energy coefficients so watermark in these sub bands are defenseless to attacks. The higher level approximation sub band (LL2 sub band) is not suitable for embedding a watermark since it is a low-frequency band that contains important information about an image and easily causes image distortions. In second level, embedding a watermark in the diagonal sub band (HH2 sub band) is also not suitable, since the sub band can easily be eliminated, for example by lossy compression as it has minor energy coefficient. So the middle frequency sub bands (Vertical & Horizontal) of higher level are the best choice for embedding. Further the LH2 sub band has more significant coefficients than the HL2 sub band. III PERFORMANCE EVALUATION Peak Signal-to-Noise Ratio (PSNR): It is the ratio between the maximum possible power of a signal and the power of corrupting noise the affects the fidelity of its representation. It is the most easily defined via the Mean Squared Error (MSE) which for two m x n images I and K where one of the images is considered as a noisy approximation of the other. MSE and PSNR can be estimated below equations. (1) ……… (2) IV PROPOSED WATERMARKING METHOD In embedding process, first separate the R, G & B channels of the color image and the blue channel is selected for the embedding because this channel is more resistant to changes compared to red and green channels and the human eye is less sensitive to the blue channel, a perceptually invisible watermark embedded in the blue channel can contain more energy than a perceptually invisible watermark embedded in the luminance channel of a color image. The blue channel is decomposed into n-level using discrete wavelet transform Let select a bmp image of size 128 x 128 as watermark and convert it into a 1-D vector, for embedding watermark bit 0 & 1 in mid frequency sub bands of higher level decomposition of the channel. Finally reconstruct the watermarked image using inverse discrete wavelet transform. Now calculate the Mean Squared Error & Peak Signal to Noise Ratio between original host image and watermarked image to evaluate the perceptual Similarity between these two images by using equation 1 & 2. In extraction process the end user separates the R, G & B channels of the watermarked image. The blue channel is decomposed into n-level using discrete wavelet transform. www.theijes.com The IJES Page 24
  • 3. A Singular Value Decomposition and Wavelet… V SINGULAR VALUE DECOMPOSITION SVD is a Mathematical tool used to analyze matrices. In this a square matrix is decomposed into three matrices of same size. A real matrix A of size NxN can be decomposed into a product of three matrices. A= USVT Where U and V are left singular and right singulars vectors of A and S is diagonal matrix. For calculating singular values, we need to find DET of the matrix, Eigen values, Eigen vectors and inverse transform after that we can get the singular values. SVD is having so many properties like Orthogonal matrices, Scaling property, The Stability of singular values, Rotation and translation invariance. VI EXPERIMENTAL RESULTS Baby.jpg color image of size 256X256 is selected as a host and best.bmp bitmap image of size 128X128 is chosen as a watermark. Figure 3 shows the original host image & l-Level decomposed blue channel using discrete wavelet transform. In Figure 4 host image, watermark, watermarked and extracted watermark on the receiver side is shown. Fig.3. Original host image & decomposed blue channel using wavelet transform Fig.4. Original host image, original watermark, watermarked image and extracted watermark Fig.5 shows watermarked image at a different embedding factors for (a) α =0.1, MSE=0.0023,PSNR=74.4430. (b) α =0.5, MSE= 0.0224, PSNR=64.6298. (c) α =0.01, MSE= 2.3376, PSNR=94.4430. The performance of the proposed method is tested by applying different geometric and image processing attacks, such as salt and pepper noise, Random noise, Rotation, Additive Gaussian noise, Gamma, Blurring and Motion Blurring attack. www.theijes.com The IJES Page 25
  • 4. A Singular Value Decomposition and Wavelet… Table1. Shows the different attacks performed in this paper. Attack Blurring Salt & Pepper Random Noise AWGN Motion blurring Rotation Gamma PSNR 78.6082 78.4430 76.5514 78.3875 74.4430 76.5514 94.4430 VII. CONCLUSION In this paper a new robust watermarking technique for copyright protection has been proposed. We applied the singular value decomposition along with the Discrete Wavelet Transform. Since the technique utilizes the properties of both DWT and SVD the proposed technique is more robust against different attacks. The innovation of this paper is that the security of the algorithm is increased with the on the watermark image. The robustness of the technique is justified by giving analysis of the effect of attacks and still we are able to get good visual quality of the embedded watermark. The performance of the proposed method is tested by applying different geometric and image processing attacks, such as salt and pepper noise, Random noise, Rotation, Additive Gaussian noise, Blurring and Motion Blurring attack. The proposed method, with stands for all these attacks. Future Scope: The watermark embedding scheme can be extended to include encrypted watermarks. Watermark extraction algorithm can be extracted to perform watermark validation automatically. Suitable feature extraction & matching techniques have to be explored. In case of the progressive image transmission the schemes for optimizing the data for each phase needs to be studied. The phase wise data compression & decompression schemes need to be evaluated. REFERENCES [1] [2] [3] [4] [5] [6] [7] C.Venkata Narsimhulu and K.Satya Prasad, “A hybrid watermarking scheme using contourlet transform and singular value decomposition”, IJCSNS International Journal of Network security, VOL.10 No.9, September 2010. Ibrahim Nasir, Ying Weng and Jianmin Jiang, “New Robust Watermarking Scheme for color image in spatial Domain”, University of Bradford, UK. Gonzalez, F.P., and J.R., Hernandez, 1998. “A tutorial on digital Watermarking”, Tech. Rep., University of Vigo, Spain. J. J. K. Ó Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” Proceedings of the IEEE, Vision, Image and Signal Processing, vol. 143, pp. 250–256, Aug. 1996. R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc. 1996 Int. Conference on Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 3, pp. 219–222. S. Kay and E. Izquierdo, “Robust content based image watermarking,” in Proc. Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS’ 2001, Tampere, Finland, May 2001. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, pp. 1673–1687, Dec. 1997. www.theijes.com The IJES Page 26