SlideShare a Scribd company logo
International Journal of Electronics and Communication Engineering & Technology (IJECET),
INTERNATIONAL JOURNAL OF ELECTRONICS AND
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Special Issue (November, 2013), pp. 202-209
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)
www.jifactor.com

IJECET
©IAEME

Digital Image Watermarking Using DCT with High Security of
Watermark using Image Fusion Technology of
Wavelet Toolbox of MATLAB
Sunil Kr. Sharma1, Divyanshu Varma2
M.Tech Scholar, Department of Electronics & Communication, Bhagwant University, Ajmer, India
1sunilsharma96@gmail.com, 2maildivyanshu@yahoo.com

ABSTRACT: A new area of research to prevent illegal piracy and duplication copying is digital
watermarking. Owing to personal computers being applied in many fields and Internet
becoming popular and easier to use, most information is transmitted with digital format.
Therefore, data copying and back up are more and easier in the World Wide Web and
multimedia. The copyright and authentication gradually lose their security [2]. How to protect
intellectual property becomes important in technical study and research. Recently, the
watermarking technique was proposed to solve the problem of protecting the intellectual
property [5]. The imperceptibility and robustness of watermarking can affect Watermarking
embedded in frequency domain using FFT or DWT or DCT. In this paper, a watermark
embedded in the host image by DCT transform has been proposed [3]. There are several
papers using the same manner to embed watermark into middle-band coefficients of DCT block
but here we proposed a new approach to provide high security as compared to other
developed watermarking tech. using image fusion of wavelet toolbox.

KEYWORDS: Digital image watermarking, discrete cosine transform (DCT), Image fusion,
Synthesized Image, Histograms.

I.

INTRODUCTION

The concept of hiding some data into an image, where data is itself an image is known as Digital
Image Watermarking. Usually watermarking technique embeds the watermarked data in the
main image and all this done by transformation, in which the main image is converted into
frequency domain & then merged with the data and the key usually a PN sequence code, text
code etc. using watermarking embedding system. As shown in following fig. 1 and fig. 2 shows
the reverse process for extraction of watermark using the watermark detection process. In
both figures, we require main image and key, So that we can recover the watermark at the
receiver end. Due to this process the transmission of main image & key with the watermarked
data will increases the complexity, insecurity, piracy etc. To reduce these problems, we
propose that the main image & watermarked image both should be combined and transmitted
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 202
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

together so that the main image is not required at the receiver end and this increase the
security highly.

Fig. 1: Watermark embedding

Fig. 2: Watermark detection

II.

DCT BASED DIGITAL WATERMARKING

DCT is a general orthogonal transform for digital image processing and signal processing with
advantages such as high compression ratio, small bit error rate, good information integration
ability and good synthetic effect of calculation complexity. One dimensional DCT can be
described with the help of (1) and (2) [1], [4]:
(0) =
( )=

√
√
√

∑
∑

(1)

( )
( ) cos

(

)

(2)

Where F (u) is cosine transform coefficient, u is general frequency variable, u=1, 2, 3…., N-1; if
f(x) is M sequence of time domain, x= 1, 2, 3… N-1, one dimensional inverse discrete cosine
transform is defined as (3) [1], [4]:
( )=

√

( )+√ ∑

( ) cos

√

(

)

(3)

Two dimensional DCT can be defined analogously as (4) [1], [4]:
( , ) = ( ) α(v) ∑

∑

( , ) cos

(

)

cos

(

)

(4)

For u, v =0,1,2,…,N −1 and α(u) and α(v) are defined in (6). The 2D inverse discrete transform is
defined as (5) [1], [4]:
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 203
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME
( , )=∑

∑

(

( ) α(v) ( , ) cos

)

cos

(

)

(5)

In both equations (4) and (5) α(u) α(v) is defined as
( ), ( ) =

√

,
,

(6)

√

DCT allows an image to be broken up into different frequency bands namely the high, middle
and low frequency bands thus making it easier to choose the band in which the watermark is to
be inserted. The literature survey reveals that mostly the middle frequency bands are chosen
because embedding the watermark in a middle frequency band does not scatter the watermark
information to most visual important parts of the image i.e. the low frequencies and also it do
not overexpose them to removal through compression and noise attacks where high frequency
components are targeted [3]. Numerous watermarking techniques based on DCT are proposed.
Although some of the watermarking techniques embed the watermark in the DC component,
most techniques utilize the comparison of middle band DCT coefficients to embed a single bit
of watermark information into a DCT block. The middle-band frequencies (FM) of an 8*8 DCT
block can be shown below in fig. 3 [2].

Fig. 3: DCT Regions
DCT block consists of three frequency bands-Low frequency band (FL), High frequency band
(FH), mid frequency band (FM). We have chosen FM for embedding the watermark.
A. Basic Watermarking Process Algorithm (without key)
Common watermarking algorithms usually include two steps: watermark embedding and
watermark detection (extraction) [4]. Let f() denote the embedding function, I the original
watermark, W the watermark to be embedded, then the watermarked image I’ can be
expressed as(7) & shown in fig. 4:
= ( ,

)

(7)

Common approach is as follows: Extract a property sequence from original image V = v1, v2…
vn, corresponding watermark sequence is X = x1, x2… xn. Embed X into V according to certain
model to obtain the adjusted sequence V’ = V + X = v’1, v’2…v’n. Put V’ back and take the place
of V, then we get the watermarked image I’.
Let E( ) denote the detection function and I’ the image to be examined. Extract the watermark
from I’ & extraction shown in fig. 5. The recovered or extracted watermark is given by (8):
= ( , )
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

(8)
October 18-20, 2013
Page 204
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 4: Watermarking Embedding Process DCT

Fig. 5: Watermark Extraction Process using DCT
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 205
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

III.

PROPOSED TECHNIQUE

From above watermarking at the receiver that main image & watermarked image both are
required. To reduce such requirement only one image can be send by using image fusion of
both images and get the synthesized image using the image fusion technique of wavelet tool
box. Basically image fusion is not only a process to combine two images of same type and size
but also technique to extract required information from images and then combine them to
form a single composite image. The image fusion process can applied in many area of image
processing like remote sensing, military surveillance, medical image analysis etc. complete
process algorithm shown in following fig. 6 [7] and applied process on our image is shown in
fig. 7 using image fusion of MATLAB WAVELET TOOLBOX.

Fig. 6 Image fusion process

Fig. 7 Image fusion using Wavelet toolbox
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 206
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 8: Synthesized image
The competitive view of all three images is as shown in fig. 8. This shows the changes in
original image due to watermark and then due to fusion of real and watermarked image which
gives synthesized output image.

Fig. 9: competitive view of all images
Another competitive view can be shown on the basis of their histograms and cumulative
histograms as shown in following figures. The comparison result of all three histograms gives
that the histograms of all images are different with little similarity at different points. All
histograms made at equal bins (50). As shown in following three figures:

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 207
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 10: Histograms of main image

Fig. 11: Histograms of Watermarked image

Fig. 12: Histograms of Synthesized image

IV.

CONCLUSION

This paper introduces the image fusion for watermark security with embedding of watermark
with the help of DCT. In this paper we first insert the watermark into main image then this
watermarked image is fused with main image. This synthesized image contains three data main
image, watermark data and watermarked image. Due to this way the requirement of main
image at detection section will reduces with high security. Here we embed the watermark with
the help of DCT but to increase the robustness we may use here DWT also. In the last the
histogram shows a comparative look which makes this technique more different and
impressive and more expressive. The results of simulation shows this system not only security
but also high image quality. The strong capability of embedding signal and anti-attack makes
different this algorithm from all other.

REFERENCES
[1] Mei Jiansheng, Li Sukang1 and Tan Xiaomei, A Digital Watermarking Algorithm Based On
DCT and DWT, Proceedings of the 2009 International Symposium on Web Information Systems
and Applications (WISA’09), Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 208
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

[2] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic Approach For Hiding Image
In DCT Domain, International Journal of Advances in Engineering & Technology, July 2011.
[3] Liu Ping Feng, Liang Bin Zheng, Peng Cao, A DWT-DCT Based Blind Watermarking
Algorithm for Copyright Protection, Beijing Institute of Graphic Communication, No. Ed0708.
[4] Abduljabbar Shaamala, Shahidan M. Abdullah and Azizah A. Manaf, Study of the effect DCT
and DWT domains on the imperceptibility and robustness of Genetic watermarking, IJCSI
International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011.
[5] Radhika v. Totla, K.S.Bapat, Comparative Analysis of Watermarking in Digital Images Using
DCT& DWT, International Journal of Scientific and Research Publications, Volume 3, Issue 2,
February 2013.
[6] Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan, Genetic
watermarking based on transform-domain techniques, Pattern Recognition 37 (2004) 555 –
565.
[7] Gengming Zhu, and Nong Sang, Watermarking Algorithm Research and Implementation
Based on DCT Block, International Journal of Electrical and Computer Engineering 4:10 2009.
[8] Franc¸ois Cayre, Caroline Fontaine, and Teddy Furon, Watermarking Security: Theory and
Practice, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL.XX, NO.Y, XYZ 2005.
[9] Chiou-Ting Hsu and Ja-Ling Wu, Hidden Digital Watermarks in Images, IEEE Transactions
On Image Processing, Vol. 8, No. 1, January 1999.

BIOGRAPHY
Sunil Kumar Sharma was born in Ajmer, Rajasthan, India in 1987. He starts
his technical career from Birla Technical Training Institute, Pilani by
Diploma in Electronics Engineering. He received the Bachelor of Engineering
degree in Electronics & Communication Engineering from M.B.M.
Engineering College, Jodhpur, India in 2011. He has been completed his P.G.
Diploma in Business Administration from SMU-DE, India in 2012. Presently
He is working as Guest Lecturer at Govt. Engineering College Ajmer, Ajmer,
India & pursuing his Master of Technology in Digital Communication from
Bhagwant University, Ajmer, India. His current research interests focus on Signals & Systems,
Signal Processing, Communication systems & Microprocessor.
Divyanshu Varma was born in Ajmer, Rajasthan, India in 1987. He starts
his technical career from Birla Technical Training Institute, Pilani by
Diploma in Electronics Engineering. He received the Bachelor of Technology
degree in Electronics & Communication Engineering from Jaipur National
University, Jaipur, India in 2011. He is pursuing his Master of Technology in
Digital Communication from Bhagwant University, Ajmer, India. His current
research interests focus on Micro-Electronics, Signal Processing and
Communication systems.

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 209

More Related Content

PPTX
Watermarking Techniques
PPT
An analysis of digital watermarking in frequency domain
PPT
Digital Watermarking
PPTX
invisible watermarking
PPTX
digital watermarking
PDF
Report on Digital Watermarking Technology
PPT
Intro Watermarking
PPT
Digital Watermarking
Watermarking Techniques
An analysis of digital watermarking in frequency domain
Digital Watermarking
invisible watermarking
digital watermarking
Report on Digital Watermarking Technology
Intro Watermarking
Digital Watermarking

What's hot (20)

PPTX
Digital Image Watermarking
PPTX
Digital Watermarking Of Medical(DICOM) Images
PPT
Digital watermarking
PPTX
Digital watermarking
PDF
Digital watermarking on medical images using dwt
PPT
Watermarking in-imageprocessing
PPTX
Digitalwatermarking
PPT
Vidhi's ppt
PPTX
CSE digital Watermarking report
PPTX
Image authentication techniques based on Image watermarking
PPT
Digital watermarking
PDF
Digital Water Marking For Video Piracy Detection
DOCX
Digitalwatermarking
PPT
Digital watermarking Techniques
PPTX
Digital watermarking techniques for security applications
PPTX
digital watermarking
DOCX
Optical Watermarking Literature survey....
PPTX
Watermarkingppt
PDF
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
DOCX
Digital Watermarking
Digital Image Watermarking
Digital Watermarking Of Medical(DICOM) Images
Digital watermarking
Digital watermarking
Digital watermarking on medical images using dwt
Watermarking in-imageprocessing
Digitalwatermarking
Vidhi's ppt
CSE digital Watermarking report
Image authentication techniques based on Image watermarking
Digital watermarking
Digital Water Marking For Video Piracy Detection
Digitalwatermarking
Digital watermarking Techniques
Digital watermarking techniques for security applications
digital watermarking
Optical Watermarking Literature survey....
Watermarkingppt
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
Digital Watermarking
Ad

Similar to Digital image watermarking using dct with high security of (20)

PDF
50120140506015
PDF
1820 1824
PDF
1820 1824
PDF
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
PDF
Enhancement of genetic image watermarking robust against cropping attack
PDF
Kassem2009
PDF
International journal of signal and image processing issues vol 2015 - no 1...
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Digital Image Watermarking Basics
PDF
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
PDF
Hybrid video watermarking technique by using dwt & pca
PDF
Kt3618371840
PDF
20120140505013
PDF
1674 1677
PDF
1674 1677
PDF
Wavelet based Image Coding Schemes: A Recent Survey
PDF
International Journal on Soft Computing ( IJSC )
PDF
Evaluation of graphic effects embedded image compression
PDF
Z03301550160
PDF
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
50120140506015
1820 1824
1820 1824
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
Enhancement of genetic image watermarking robust against cropping attack
Kassem2009
International journal of signal and image processing issues vol 2015 - no 1...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Digital Image Watermarking Basics
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
Hybrid video watermarking technique by using dwt & pca
Kt3618371840
20120140505013
1674 1677
1674 1677
Wavelet based Image Coding Schemes: A Recent Survey
International Journal on Soft Computing ( IJSC )
Evaluation of graphic effects embedded image compression
Z03301550160
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
Ad

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf

Digital image watermarking using dct with high security of

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), INTERNATIONAL JOURNAL OF ELECTRONICS AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Special Issue (November, 2013), pp. 202-209 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET ©IAEME Digital Image Watermarking Using DCT with High Security of Watermark using Image Fusion Technology of Wavelet Toolbox of MATLAB Sunil Kr. Sharma1, Divyanshu Varma2 M.Tech Scholar, Department of Electronics & Communication, Bhagwant University, Ajmer, India 1sunilsharma96@gmail.com, 2maildivyanshu@yahoo.com ABSTRACT: A new area of research to prevent illegal piracy and duplication copying is digital watermarking. Owing to personal computers being applied in many fields and Internet becoming popular and easier to use, most information is transmitted with digital format. Therefore, data copying and back up are more and easier in the World Wide Web and multimedia. The copyright and authentication gradually lose their security [2]. How to protect intellectual property becomes important in technical study and research. Recently, the watermarking technique was proposed to solve the problem of protecting the intellectual property [5]. The imperceptibility and robustness of watermarking can affect Watermarking embedded in frequency domain using FFT or DWT or DCT. In this paper, a watermark embedded in the host image by DCT transform has been proposed [3]. There are several papers using the same manner to embed watermark into middle-band coefficients of DCT block but here we proposed a new approach to provide high security as compared to other developed watermarking tech. using image fusion of wavelet toolbox. KEYWORDS: Digital image watermarking, discrete cosine transform (DCT), Image fusion, Synthesized Image, Histograms. I. INTRODUCTION The concept of hiding some data into an image, where data is itself an image is known as Digital Image Watermarking. Usually watermarking technique embeds the watermarked data in the main image and all this done by transformation, in which the main image is converted into frequency domain & then merged with the data and the key usually a PN sequence code, text code etc. using watermarking embedding system. As shown in following fig. 1 and fig. 2 shows the reverse process for extraction of watermark using the watermark detection process. In both figures, we require main image and key, So that we can recover the watermark at the receiver end. Due to this process the transmission of main image & key with the watermarked data will increases the complexity, insecurity, piracy etc. To reduce these problems, we propose that the main image & watermarked image both should be combined and transmitted International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 202
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME together so that the main image is not required at the receiver end and this increase the security highly. Fig. 1: Watermark embedding Fig. 2: Watermark detection II. DCT BASED DIGITAL WATERMARKING DCT is a general orthogonal transform for digital image processing and signal processing with advantages such as high compression ratio, small bit error rate, good information integration ability and good synthetic effect of calculation complexity. One dimensional DCT can be described with the help of (1) and (2) [1], [4]: (0) = ( )= √ √ √ ∑ ∑ (1) ( ) ( ) cos ( ) (2) Where F (u) is cosine transform coefficient, u is general frequency variable, u=1, 2, 3…., N-1; if f(x) is M sequence of time domain, x= 1, 2, 3… N-1, one dimensional inverse discrete cosine transform is defined as (3) [1], [4]: ( )= √ ( )+√ ∑ ( ) cos √ ( ) (3) Two dimensional DCT can be defined analogously as (4) [1], [4]: ( , ) = ( ) α(v) ∑ ∑ ( , ) cos ( ) cos ( ) (4) For u, v =0,1,2,…,N −1 and α(u) and α(v) are defined in (6). The 2D inverse discrete transform is defined as (5) [1], [4]: International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 203
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME ( , )=∑ ∑ ( ( ) α(v) ( , ) cos ) cos ( ) (5) In both equations (4) and (5) α(u) α(v) is defined as ( ), ( ) = √ , , (6) √ DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands thus making it easier to choose the band in which the watermark is to be inserted. The literature survey reveals that mostly the middle frequency bands are chosen because embedding the watermark in a middle frequency band does not scatter the watermark information to most visual important parts of the image i.e. the low frequencies and also it do not overexpose them to removal through compression and noise attacks where high frequency components are targeted [3]. Numerous watermarking techniques based on DCT are proposed. Although some of the watermarking techniques embed the watermark in the DC component, most techniques utilize the comparison of middle band DCT coefficients to embed a single bit of watermark information into a DCT block. The middle-band frequencies (FM) of an 8*8 DCT block can be shown below in fig. 3 [2]. Fig. 3: DCT Regions DCT block consists of three frequency bands-Low frequency band (FL), High frequency band (FH), mid frequency band (FM). We have chosen FM for embedding the watermark. A. Basic Watermarking Process Algorithm (without key) Common watermarking algorithms usually include two steps: watermark embedding and watermark detection (extraction) [4]. Let f() denote the embedding function, I the original watermark, W the watermark to be embedded, then the watermarked image I’ can be expressed as(7) & shown in fig. 4: = ( , ) (7) Common approach is as follows: Extract a property sequence from original image V = v1, v2… vn, corresponding watermark sequence is X = x1, x2… xn. Embed X into V according to certain model to obtain the adjusted sequence V’ = V + X = v’1, v’2…v’n. Put V’ back and take the place of V, then we get the watermarked image I’. Let E( ) denote the detection function and I’ the image to be examined. Extract the watermark from I’ & extraction shown in fig. 5. The recovered or extracted watermark is given by (8): = ( , ) International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India (8) October 18-20, 2013 Page 204
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 4: Watermarking Embedding Process DCT Fig. 5: Watermark Extraction Process using DCT International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 205
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME III. PROPOSED TECHNIQUE From above watermarking at the receiver that main image & watermarked image both are required. To reduce such requirement only one image can be send by using image fusion of both images and get the synthesized image using the image fusion technique of wavelet tool box. Basically image fusion is not only a process to combine two images of same type and size but also technique to extract required information from images and then combine them to form a single composite image. The image fusion process can applied in many area of image processing like remote sensing, military surveillance, medical image analysis etc. complete process algorithm shown in following fig. 6 [7] and applied process on our image is shown in fig. 7 using image fusion of MATLAB WAVELET TOOLBOX. Fig. 6 Image fusion process Fig. 7 Image fusion using Wavelet toolbox International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 206
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 8: Synthesized image The competitive view of all three images is as shown in fig. 8. This shows the changes in original image due to watermark and then due to fusion of real and watermarked image which gives synthesized output image. Fig. 9: competitive view of all images Another competitive view can be shown on the basis of their histograms and cumulative histograms as shown in following figures. The comparison result of all three histograms gives that the histograms of all images are different with little similarity at different points. All histograms made at equal bins (50). As shown in following three figures: International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 207
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 10: Histograms of main image Fig. 11: Histograms of Watermarked image Fig. 12: Histograms of Synthesized image IV. CONCLUSION This paper introduces the image fusion for watermark security with embedding of watermark with the help of DCT. In this paper we first insert the watermark into main image then this watermarked image is fused with main image. This synthesized image contains three data main image, watermark data and watermarked image. Due to this way the requirement of main image at detection section will reduces with high security. Here we embed the watermark with the help of DCT but to increase the robustness we may use here DWT also. In the last the histogram shows a comparative look which makes this technique more different and impressive and more expressive. The results of simulation shows this system not only security but also high image quality. The strong capability of embedding signal and anti-attack makes different this algorithm from all other. REFERENCES [1] Mei Jiansheng, Li Sukang1 and Tan Xiaomei, A Digital Watermarking Algorithm Based On DCT and DWT, Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09), Nanchang, P. R. China, May 22-24, 2009, pp. 104-107. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 208
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME [2] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic Approach For Hiding Image In DCT Domain, International Journal of Advances in Engineering & Technology, July 2011. [3] Liu Ping Feng, Liang Bin Zheng, Peng Cao, A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, Beijing Institute of Graphic Communication, No. Ed0708. [4] Abduljabbar Shaamala, Shahidan M. Abdullah and Azizah A. Manaf, Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011. [5] Radhika v. Totla, K.S.Bapat, Comparative Analysis of Watermarking in Digital Images Using DCT& DWT, International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013. [6] Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan, Genetic watermarking based on transform-domain techniques, Pattern Recognition 37 (2004) 555 – 565. [7] Gengming Zhu, and Nong Sang, Watermarking Algorithm Research and Implementation Based on DCT Block, International Journal of Electrical and Computer Engineering 4:10 2009. [8] Franc¸ois Cayre, Caroline Fontaine, and Teddy Furon, Watermarking Security: Theory and Practice, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL.XX, NO.Y, XYZ 2005. [9] Chiou-Ting Hsu and Ja-Ling Wu, Hidden Digital Watermarks in Images, IEEE Transactions On Image Processing, Vol. 8, No. 1, January 1999. BIOGRAPHY Sunil Kumar Sharma was born in Ajmer, Rajasthan, India in 1987. He starts his technical career from Birla Technical Training Institute, Pilani by Diploma in Electronics Engineering. He received the Bachelor of Engineering degree in Electronics & Communication Engineering from M.B.M. Engineering College, Jodhpur, India in 2011. He has been completed his P.G. Diploma in Business Administration from SMU-DE, India in 2012. Presently He is working as Guest Lecturer at Govt. Engineering College Ajmer, Ajmer, India & pursuing his Master of Technology in Digital Communication from Bhagwant University, Ajmer, India. His current research interests focus on Signals & Systems, Signal Processing, Communication systems & Microprocessor. Divyanshu Varma was born in Ajmer, Rajasthan, India in 1987. He starts his technical career from Birla Technical Training Institute, Pilani by Diploma in Electronics Engineering. He received the Bachelor of Technology degree in Electronics & Communication Engineering from Jaipur National University, Jaipur, India in 2011. He is pursuing his Master of Technology in Digital Communication from Bhagwant University, Ajmer, India. His current research interests focus on Micro-Electronics, Signal Processing and Communication systems. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 209