SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2996
PROTECTION OF MULTISPECTRAL IMAGES USING WATERMARKING
AND ENCRYPTION
HARSHA PUSHPAN1, PRACHOD P PILLAI2
1PG SCHOLAR, Dept. of Computer Science & Engineering, Musaliar College of Engineering & Technology,
Pathanamthitta, Kerala
2Associate Professor, Dept. of Computer Science & Engineering, Musaliar College of Engineering & Technology,
Pathanamthitta, Kerala
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – The key problem in spatial information
service is the copyright protection of multispectral images.
This paper defines a scheme that combines watermarking and
encryption for the protection of multispectral images. This
paper proposes wavelet based watermarking and a secured
multiplicative-transposition-based cipher for encryption.
Experimental results show that the proposed algorithm
provides good robustness against encryption attacks
,transparency, strength, large data hiding capacity, correct
extraction of watermark, and strong robustness against JPEG
lossy compression, filtering, and noise.
Key Words: Multispectral image, Watermarking,
Waveletbasedwatermarking,Encryption,Multiplicative
and Transposition based cipher.
1. INTRODUCTION
Digitising texts, images, videos are very easy in this era due
to the advancement of technology. Digital data can be easily
accessed and shared with the help of Internet. But thisleads
to misuse of digital data. The unauthorized acquisition of
multispectral images and its preprocessing are cost- and
manpower-intensive tasks. Hence, it is important to protect
the ownership rights of the data owner and data processing.
Digital watermarking serves as a good and efficient solution
for the above said problem. Multispectral imagesareusedin
various applications including defense, which are related to
national security, so need high level of confidentiality. This
makes multispectral images highly sensitive and its
confidentiality needs urgent attention. Therefore, certain
precautions have to be adopted in handling the sharing of
such sensitive and confidential images over the Internet.
Although standard and asymmetric encryption algorithms
like AES, DES, and RSA are available, they cannot be
implemented for multispectral images as the data volumeis
high and nature of multispectral images.Asinglekeycannot
be used for encrypting multispectral images. For multiple
keys, key storage and implementation for such a high-
volume data is impractical. Moreover, these algorithms are
time consuming for encryption as well as decryption. The
combination of encryption and watermarking could be the
best solution to provide security and confidentiality for
multispectral images.
2. LITERATURE SURVEY
The paper “Content security protection for remote sensing
images integrating selective content encryption and digital
fingerprint” by Y. Xu, Z. Xu, and Y. Zhang ,proposed a method
by combining watermarking and encryption. They tried to
embed watermark at decryption. This scheme does not
provide total security and confidentiality as the encrypted
image does not carry watermark.
L. Jiang and Z. Xu proposed “Commutative encryption and
watermarking for remote sensing image” that implement
commutative encryption and watermarking solution for
remote sensing images. They used spatial scrambling based
on Arnold scrambling for encryption using a symmetric
scheme for whole remote sensing image. If the key is
compromised, the whole encryption procedure would fail.
L. Jiang, Z. Xu, and Y. Xu proposed “A new comprehensive
security protection for remote sensing image based on the
integration of encryption and watermarking” to integrate
encryption and watermarking using orthogonal
decomposition of remote sensing images. This method has
important effects on edges of remote sensing images and
need to perform some preprocessing at watermarking to
retainand recover edge information.
3. DISCRETE WAVELET TRANSFORM
The wavelet transform is based on function representing
wavelets. Wavelets are mathematical function that
represents both the scaled and translated copies of a finite-
length waveform i.e, mother wavelet. It helps to calculate
different frequency components of the given multispectral
image at different resolution levels. Discrete wavelet
transform (DWT) is a multi resolution description of an
image that represents the mathematical function. DWT
separates the signal into high- and low-frequency
coefficients.
The high-frequency coefficients contain information about
the edge components, while the low-frequency coefficient is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2997
split again into high- and low-frequencycoefficients.The2-D
wavelet transform decomposes an image into lower
resolution approximation coefficients (LL) and detail
coefficients such as horizontal (HL), vertical (LH), and
diagonal (HH) coeffi- cients. Watermark embedding in low
frequency (LL) increases robustness against compression,
Gaussian noise, scaling, and cropping whilewatermarking in
high frequency (HH) is robust to histogram equalizationand
intensity adjustments.
4. PROPOSED METHOD
Multispectral image mostly includes satellite images and
aerial photographs. The demandforthesedata hasincreased
dramatically due to the large numberofapplicationscapable
to use them. Digital watermarking and encryption are used
to achieve copyright protection andsecurityofmultispectral
images at dissemination level. A wavelet-based algorithm is
developed for copyright protection. Simple and strongly
secure encryption based on multiplicative and two-stage
transposition cipher is used to provide security at the
transmission level.
Fig 1 : Proposed System
4.1 Discrete Wavelet Transform
Wavelets are a special kind of mathematical functions, in
DWT (Discrete Wavelet Transform) there is a need to deal
with two sets of functions scaling functions and wavelet
functions . Most of the scaling and wavelet functions are
fractal. The commonly used wavelet functions are ‘Haar,
Daubechies, Symlets, Coiflets, Biorthogonal, Discrete Meyer
etc. Filter cofficients of these wavelet functions are discrete.
The steps in watermark preprocessing are:
1) Watermark preprocessing: To enhance the robustness
and security of the watermarking scheme, it is always
desirable toapplybasic transformationonwatermark before
embedding it into host data. Matrix interleaving is used in
this method.
2) Watermark Embedding:
The embedding algorithm uses a binaryimageaswatermark
and color multispectral image as a host image. Host
multispectral image is decomposed up to third level for the
process of watermark embedding.
Algorithm 1. Watermark Embedding
Input: Host image (R), Binary Watermark (W ), Matrix
interleaved position (M)
Process:
(1) Scramble the watermark (length = N ) using M
(2) Apply 2-D DWT on each channel of host multispec-tral
image up to 3 levels (LL3, HL3, LH3, and HH3). Select LL3 and
HH3 coefficients for watermark embedding.
(3) At third level, calculate watermark strength (alpha) as a
function of wavelet coefficients.
alpha = mean mean Ck
ch(i, j)
where i, j = 1, .., n ch = R, G, B k = LL3 , HH3
(4) Watermark is embedded in selected waveletcoefficients
as:
Ck(i, j) +alpha × W (l, m)
Ck (i, j) = Ck
where i, j = 1..n l, m = 1 . . . N ch = R, G, B
k = LL3 , HH3
(5)Apply inverse DWT to obtain watermarked
multispectral image.
˜
Output: Watermarked image (R)
Watermark Extraction
˜
Input: Watermarked image (R), Host image (R), Arnold
Key (Ak)
Process:
1) Using 2-D DWT, perform a third level decomposition of
the watermarked host image.
2) Calculate alpha from selected coefficients (LL3, HH3) of
each band of host multispectral image (R).
3) Extract the watermarks from LL3 andHH3 coefficients and
perform averaging to get scrambled watermark.
Embedding
Decryption
Encryption
Extraction
Watermark
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2998
4) Obtain the binary watermark (W ) by applying inverse of
matrix interleaving.
Multiplicative and Transposition Cipher-Based
Encryption
For encryption and decryption of multispectral images, we
are proposing multiplicative andtranspositioncipher(MTC)
based on symmetric key multiplicative affine cipher and
two-stage transposition cipher. Individually, they are
vulnerable to brute force, statistical, and cipher text-only
attacks. However, combination and proper cascading of
these ciphers provide more secure and strong cipher than
the individual.
We are applying MTC on multispectral image (red, green,
and blue channel) of size M × N and gray levels G. Even and
odd row elements are multiplied by EKER and EKOR.Eachrow
and column are shifted by EKSR and EKSC . Even and odd
column elements are multiplied by EKEC andEKOC .Multiplier
parameters EKER, EKOR, EKEC , and EKOC are relativelyprimeto
G, whereas 0 < EKSR < M and 0 < EKSC < N.
For RGB multispectral image, we have (3 × 6)! options for
key arrangement. At decoder side, boththecorrectsequence
of operations and correct keys should be available to get the
correct decryption; otherwise decoder cannot recover the
original image.
5. ANALYSIS
We have tested the performance of the proposed system on
different multispectral images of varying sizes on MATLAB
on 2.27 GHz Core Duo Processor.
The term peak signal-to-noise ratio (PSNR) is an expression
for the ratio between the maximum possible value (power) of
a signal and the power of distorting noise that affects the
quality of its representation. Because many signals have a
very wide dynamic range, (ratio between the largest and
smallest possible values of a changeable quantity)the PSNR is
usually expressed in terms of the logarithmic decibel scale.
Entropy converts any class other than logical to uint8 for the
histogram count calculation so that the pixel values are
discrete and directly correspond to a bin value.
Rough entropy measures calculation of the cluster centers
which is based on lower and upper approximation generated
by assignment of data objects to the cluster centers.
Roughness of the cluster center is calculated from lower and
upper approximations of each cluster center. In the next step,
rough entropy is calculated as the sum of all entropies of
cluster center roughness values.
A good encryption algorithm shouldrobustagainstall kindsof
brute force, cryptanalytic, and statistical attacks. The
histogram of encrypted image should be uniform to avoid
statistical attacks. Similarly,keyspacemustbelargeenoughto
avoid brute force attacks. In this section, the robustnessof the
proposed encryption algorithm is presented. It has been
observed that the proposed algorithm is robust against all the
mentioned attacks.
Key Sensitivity Analysis: In MTC, correct encryption and
decryption are highly sensitive to the utilized key space.
Secure image cryptosystems need high key sensitivity so that
the image cannot be decrypted correctly even if thereisa very
small change in correct keys. Key used in multiplicativecipher
are more sensitive as inverse of these keys only exists if it is
relatively prime to gray levels of an image. Original image
cannot be obtained even if a very small change occurs inthese
keys. The sequence of operations in MTC is also sensitive, as a
small sequence change can result into an incorrect decrypted
multispectral image.
Histogram Analysis: The encryption algorithm is strong if it
possesses good confusion and diffusionproperties.Histogram
analysis is used to demonstrate confusion and diffusion ofthe
proposed scheme. The color variations in RGB channels ofthe
original and encrypted image are represented in terms of
histogram. It is observed that the histogram of the encrypted
image is nearly uniformly distributed, and significantly
different from the respective histogramsoftheoriginal image.
So the encrypted image does not provide clues to employ any
statistical attack on the proposed scheme.
Table 1 : Entropy Analysis
6. CONCLUSION
It is important to protect the ownership rights of the data
owner. Digital watermarking serves as a solution over the
above said problem.Multispectral imagesareusedinvarious
applications including defense, which are relatedtonational
security. This makes multispectral images highly sensitive
and its security needs urgent attention. In this paper crypto
watermarking, a combination of watermarking and
encryption to provide copyright protection form
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2999
multispectral images and secure delivery of copy righted
multispectral images is proposed. During transmission,
encryption can be used to prevent information leakage and
protocol attacks.
Ownership can be proved later as invisible water mark is
retained in the multispectral image. Ownership cannot be
proved until and unless the original multispectral image is
made available. It is observed that the proposed crypto-
watermarking approach satisfies the security of encryption,
the invisibility, robustness, and classification accuracy
retention of watermarking. Moreover, this algorithm
survives all the attacks havinglow-frequencyaswell ashigh-
frequency characteristics as we have utilized both low- and
high-frequencybandsforwatermarking. Thesamealgorithm
can further be used for hyperspectral images security at
storage as well as the dissemination.
REFERENCES
[1] T. Hemalatha, V. Joevivek, K. Sukumar, and K. Soman,
“Robust water- marking of remote sensing images without
the loss of spatial infor- mation,” in Proc. 10th ESRI India
User Conf., 2009, vol. 1, no. 2, pp. 1–8.
[2] B. Kumari and V. Rallabandi,“Modifiedpatchwork-based
watermarking scheme for satellite imagery,”Signal Process.,
vol. 88, no. 4, pp. 891– 904, 2008.
[3] P. Zhu and C. Chen,“Acopyrightprotection watermarking
algorithm for remote sensing image based on binary image
watermark,” Int. J. Light Electron Opt., vol. 124, no. 20, pp.
4177–4181, 2013.
[4] Y. Xu, Z. Xu, and Y. Zhang, “Content securityprotection for
remote sensing images integrating selective content
encryption and digital fingerprint,”J.Appl.RemoteSens., vol.
6, no. 1, p. 063505, 2012.
[5] L. Jiang and Z. Xu, “Commutative encryption and
watermarking for remote sensing image,” Int. J. Digital
Content Technol. Appl., vol. 6, no. 4, pp. 197–205, 2012.
[6] L. Jiang, Z. Xu, and Y. Xu, “A new comprehensive security
protection for remote sensing image based on the
integration of encryption and watermarking,” in Proc. IEEE
Int. Geosci. Remote Sens. Symp., 2013, pp. 2577–2580.
[7] S. Mallat, “The theory for multiresolution signal
decomposition: The wavelet representation,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 11, no. 7, pp. 654–693, 1989.

More Related Content

PDF
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
PDF
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
PDF
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
PDF
Hybrid video watermarking technique by using dwt & pca
PDF
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
PDF
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
PDF
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
PDF
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
Hybrid video watermarking technique by using dwt & pca
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...

What's hot (18)

PDF
1674 1677
PDF
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
PDF
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
PDF
Ja2415771582
PDF
I43014752
PDF
Blind Key Steganography Based on Multilevel Wavelet and CSF
PDF
IRJET- Wavelet Transform based Steganography
PDF
Blind Image Watermarking Based on Chaotic Maps
PDF
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
PDF
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
PDF
International Journal for Research in Applied Science & Engineering
PDF
G0523444
PDF
Self Attested Images for Secured Transactions using Superior SOM
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
PDF
Introduction to National Supercomputer center in Tianjin TH-1A Supercomputer
PDF
14 vikram kumar_150-159
PDF
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PDF
Digital Image Security using Digital Watermarking
1674 1677
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
Ja2415771582
I43014752
Blind Key Steganography Based on Multilevel Wavelet and CSF
IRJET- Wavelet Transform based Steganography
Blind Image Watermarking Based on Chaotic Maps
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
International Journal for Research in Applied Science & Engineering
G0523444
Self Attested Images for Secured Transactions using Superior SOM
Implementation of digital image watermarking techniques using dwt and dwt svd...
Introduction to National Supercomputer center in Tianjin TH-1A Supercomputer
14 vikram kumar_150-159
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
Digital Image Security using Digital Watermarking
Ad

Similar to Protection of Multispectral Images using Watermarking and Encryption (20)

PDF
Comparative Analysis of DCT and DWT based novel methods for Watermarking
PDF
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
PDF
A Blind Multiple Watermarks based on Human Visual Characteristics
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
PDF
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
PDF
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
PDF
Commutative approach for securing digital media
PDF
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
PDF
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
PDF
IRJET - Steganography based on Discrete Wavelet Transform
PDF
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
PDF
50120140506015
PDF
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
PDF
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
PDF
Hybrid DCT-DWT Digital Image Steganography
PDF
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
PDF
Digital Image Watermarking Basics
PDF
A novel attack detection technique to find attack in watermarked images with ...
PDF
An ideal steganographic scheme in networks using
PDF
An ideal steganographic scheme in networks using twisted payload
Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
A Blind Multiple Watermarks based on Human Visual Characteristics
Implementation of digital image watermarking techniques using dwt and dwt svd...
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
Commutative approach for securing digital media
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
IRJET - Steganography based on Discrete Wavelet Transform
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
50120140506015
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
Hybrid DCT-DWT Digital Image Steganography
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Digital Image Watermarking Basics
A novel attack detection technique to find attack in watermarked images with ...
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using twisted payload
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Construction Project Organization Group 2.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
composite construction of structures.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
UNIT 4 Total Quality Management .pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Construction Project Organization Group 2.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
composite construction of structures.pdf
bas. eng. economics group 4 presentation 1.pptx
additive manufacturing of ss316l using mig welding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
UNIT 4 Total Quality Management .pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Foundation to blockchain - A guide to Blockchain Tech
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Digital Logic Computer Design lecture notes
CH1 Production IntroductoryConcepts.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Protection of Multispectral Images using Watermarking and Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2996 PROTECTION OF MULTISPECTRAL IMAGES USING WATERMARKING AND ENCRYPTION HARSHA PUSHPAN1, PRACHOD P PILLAI2 1PG SCHOLAR, Dept. of Computer Science & Engineering, Musaliar College of Engineering & Technology, Pathanamthitta, Kerala 2Associate Professor, Dept. of Computer Science & Engineering, Musaliar College of Engineering & Technology, Pathanamthitta, Kerala ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The key problem in spatial information service is the copyright protection of multispectral images. This paper defines a scheme that combines watermarking and encryption for the protection of multispectral images. This paper proposes wavelet based watermarking and a secured multiplicative-transposition-based cipher for encryption. Experimental results show that the proposed algorithm provides good robustness against encryption attacks ,transparency, strength, large data hiding capacity, correct extraction of watermark, and strong robustness against JPEG lossy compression, filtering, and noise. Key Words: Multispectral image, Watermarking, Waveletbasedwatermarking,Encryption,Multiplicative and Transposition based cipher. 1. INTRODUCTION Digitising texts, images, videos are very easy in this era due to the advancement of technology. Digital data can be easily accessed and shared with the help of Internet. But thisleads to misuse of digital data. The unauthorized acquisition of multispectral images and its preprocessing are cost- and manpower-intensive tasks. Hence, it is important to protect the ownership rights of the data owner and data processing. Digital watermarking serves as a good and efficient solution for the above said problem. Multispectral imagesareusedin various applications including defense, which are related to national security, so need high level of confidentiality. This makes multispectral images highly sensitive and its confidentiality needs urgent attention. Therefore, certain precautions have to be adopted in handling the sharing of such sensitive and confidential images over the Internet. Although standard and asymmetric encryption algorithms like AES, DES, and RSA are available, they cannot be implemented for multispectral images as the data volumeis high and nature of multispectral images.Asinglekeycannot be used for encrypting multispectral images. For multiple keys, key storage and implementation for such a high- volume data is impractical. Moreover, these algorithms are time consuming for encryption as well as decryption. The combination of encryption and watermarking could be the best solution to provide security and confidentiality for multispectral images. 2. LITERATURE SURVEY The paper “Content security protection for remote sensing images integrating selective content encryption and digital fingerprint” by Y. Xu, Z. Xu, and Y. Zhang ,proposed a method by combining watermarking and encryption. They tried to embed watermark at decryption. This scheme does not provide total security and confidentiality as the encrypted image does not carry watermark. L. Jiang and Z. Xu proposed “Commutative encryption and watermarking for remote sensing image” that implement commutative encryption and watermarking solution for remote sensing images. They used spatial scrambling based on Arnold scrambling for encryption using a symmetric scheme for whole remote sensing image. If the key is compromised, the whole encryption procedure would fail. L. Jiang, Z. Xu, and Y. Xu proposed “A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking” to integrate encryption and watermarking using orthogonal decomposition of remote sensing images. This method has important effects on edges of remote sensing images and need to perform some preprocessing at watermarking to retainand recover edge information. 3. DISCRETE WAVELET TRANSFORM The wavelet transform is based on function representing wavelets. Wavelets are mathematical function that represents both the scaled and translated copies of a finite- length waveform i.e, mother wavelet. It helps to calculate different frequency components of the given multispectral image at different resolution levels. Discrete wavelet transform (DWT) is a multi resolution description of an image that represents the mathematical function. DWT separates the signal into high- and low-frequency coefficients. The high-frequency coefficients contain information about the edge components, while the low-frequency coefficient is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2997 split again into high- and low-frequencycoefficients.The2-D wavelet transform decomposes an image into lower resolution approximation coefficients (LL) and detail coefficients such as horizontal (HL), vertical (LH), and diagonal (HH) coeffi- cients. Watermark embedding in low frequency (LL) increases robustness against compression, Gaussian noise, scaling, and cropping whilewatermarking in high frequency (HH) is robust to histogram equalizationand intensity adjustments. 4. PROPOSED METHOD Multispectral image mostly includes satellite images and aerial photographs. The demandforthesedata hasincreased dramatically due to the large numberofapplicationscapable to use them. Digital watermarking and encryption are used to achieve copyright protection andsecurityofmultispectral images at dissemination level. A wavelet-based algorithm is developed for copyright protection. Simple and strongly secure encryption based on multiplicative and two-stage transposition cipher is used to provide security at the transmission level. Fig 1 : Proposed System 4.1 Discrete Wavelet Transform Wavelets are a special kind of mathematical functions, in DWT (Discrete Wavelet Transform) there is a need to deal with two sets of functions scaling functions and wavelet functions . Most of the scaling and wavelet functions are fractal. The commonly used wavelet functions are ‘Haar, Daubechies, Symlets, Coiflets, Biorthogonal, Discrete Meyer etc. Filter cofficients of these wavelet functions are discrete. The steps in watermark preprocessing are: 1) Watermark preprocessing: To enhance the robustness and security of the watermarking scheme, it is always desirable toapplybasic transformationonwatermark before embedding it into host data. Matrix interleaving is used in this method. 2) Watermark Embedding: The embedding algorithm uses a binaryimageaswatermark and color multispectral image as a host image. Host multispectral image is decomposed up to third level for the process of watermark embedding. Algorithm 1. Watermark Embedding Input: Host image (R), Binary Watermark (W ), Matrix interleaved position (M) Process: (1) Scramble the watermark (length = N ) using M (2) Apply 2-D DWT on each channel of host multispec-tral image up to 3 levels (LL3, HL3, LH3, and HH3). Select LL3 and HH3 coefficients for watermark embedding. (3) At third level, calculate watermark strength (alpha) as a function of wavelet coefficients. alpha = mean mean Ck ch(i, j) where i, j = 1, .., n ch = R, G, B k = LL3 , HH3 (4) Watermark is embedded in selected waveletcoefficients as: Ck(i, j) +alpha × W (l, m) Ck (i, j) = Ck where i, j = 1..n l, m = 1 . . . N ch = R, G, B k = LL3 , HH3 (5)Apply inverse DWT to obtain watermarked multispectral image. ˜ Output: Watermarked image (R) Watermark Extraction ˜ Input: Watermarked image (R), Host image (R), Arnold Key (Ak) Process: 1) Using 2-D DWT, perform a third level decomposition of the watermarked host image. 2) Calculate alpha from selected coefficients (LL3, HH3) of each band of host multispectral image (R). 3) Extract the watermarks from LL3 andHH3 coefficients and perform averaging to get scrambled watermark. Embedding Decryption Encryption Extraction Watermark
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2998 4) Obtain the binary watermark (W ) by applying inverse of matrix interleaving. Multiplicative and Transposition Cipher-Based Encryption For encryption and decryption of multispectral images, we are proposing multiplicative andtranspositioncipher(MTC) based on symmetric key multiplicative affine cipher and two-stage transposition cipher. Individually, they are vulnerable to brute force, statistical, and cipher text-only attacks. However, combination and proper cascading of these ciphers provide more secure and strong cipher than the individual. We are applying MTC on multispectral image (red, green, and blue channel) of size M × N and gray levels G. Even and odd row elements are multiplied by EKER and EKOR.Eachrow and column are shifted by EKSR and EKSC . Even and odd column elements are multiplied by EKEC andEKOC .Multiplier parameters EKER, EKOR, EKEC , and EKOC are relativelyprimeto G, whereas 0 < EKSR < M and 0 < EKSC < N. For RGB multispectral image, we have (3 × 6)! options for key arrangement. At decoder side, boththecorrectsequence of operations and correct keys should be available to get the correct decryption; otherwise decoder cannot recover the original image. 5. ANALYSIS We have tested the performance of the proposed system on different multispectral images of varying sizes on MATLAB on 2.27 GHz Core Duo Processor. The term peak signal-to-noise ratio (PSNR) is an expression for the ratio between the maximum possible value (power) of a signal and the power of distorting noise that affects the quality of its representation. Because many signals have a very wide dynamic range, (ratio between the largest and smallest possible values of a changeable quantity)the PSNR is usually expressed in terms of the logarithmic decibel scale. Entropy converts any class other than logical to uint8 for the histogram count calculation so that the pixel values are discrete and directly correspond to a bin value. Rough entropy measures calculation of the cluster centers which is based on lower and upper approximation generated by assignment of data objects to the cluster centers. Roughness of the cluster center is calculated from lower and upper approximations of each cluster center. In the next step, rough entropy is calculated as the sum of all entropies of cluster center roughness values. A good encryption algorithm shouldrobustagainstall kindsof brute force, cryptanalytic, and statistical attacks. The histogram of encrypted image should be uniform to avoid statistical attacks. Similarly,keyspacemustbelargeenoughto avoid brute force attacks. In this section, the robustnessof the proposed encryption algorithm is presented. It has been observed that the proposed algorithm is robust against all the mentioned attacks. Key Sensitivity Analysis: In MTC, correct encryption and decryption are highly sensitive to the utilized key space. Secure image cryptosystems need high key sensitivity so that the image cannot be decrypted correctly even if thereisa very small change in correct keys. Key used in multiplicativecipher are more sensitive as inverse of these keys only exists if it is relatively prime to gray levels of an image. Original image cannot be obtained even if a very small change occurs inthese keys. The sequence of operations in MTC is also sensitive, as a small sequence change can result into an incorrect decrypted multispectral image. Histogram Analysis: The encryption algorithm is strong if it possesses good confusion and diffusionproperties.Histogram analysis is used to demonstrate confusion and diffusion ofthe proposed scheme. The color variations in RGB channels ofthe original and encrypted image are represented in terms of histogram. It is observed that the histogram of the encrypted image is nearly uniformly distributed, and significantly different from the respective histogramsoftheoriginal image. So the encrypted image does not provide clues to employ any statistical attack on the proposed scheme. Table 1 : Entropy Analysis 6. CONCLUSION It is important to protect the ownership rights of the data owner. Digital watermarking serves as a solution over the above said problem.Multispectral imagesareusedinvarious applications including defense, which are relatedtonational security. This makes multispectral images highly sensitive and its security needs urgent attention. In this paper crypto watermarking, a combination of watermarking and encryption to provide copyright protection form
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2999 multispectral images and secure delivery of copy righted multispectral images is proposed. During transmission, encryption can be used to prevent information leakage and protocol attacks. Ownership can be proved later as invisible water mark is retained in the multispectral image. Ownership cannot be proved until and unless the original multispectral image is made available. It is observed that the proposed crypto- watermarking approach satisfies the security of encryption, the invisibility, robustness, and classification accuracy retention of watermarking. Moreover, this algorithm survives all the attacks havinglow-frequencyaswell ashigh- frequency characteristics as we have utilized both low- and high-frequencybandsforwatermarking. Thesamealgorithm can further be used for hyperspectral images security at storage as well as the dissemination. REFERENCES [1] T. Hemalatha, V. Joevivek, K. Sukumar, and K. Soman, “Robust water- marking of remote sensing images without the loss of spatial infor- mation,” in Proc. 10th ESRI India User Conf., 2009, vol. 1, no. 2, pp. 1–8. [2] B. Kumari and V. Rallabandi,“Modifiedpatchwork-based watermarking scheme for satellite imagery,”Signal Process., vol. 88, no. 4, pp. 891– 904, 2008. [3] P. Zhu and C. Chen,“Acopyrightprotection watermarking algorithm for remote sensing image based on binary image watermark,” Int. J. Light Electron Opt., vol. 124, no. 20, pp. 4177–4181, 2013. [4] Y. Xu, Z. Xu, and Y. Zhang, “Content securityprotection for remote sensing images integrating selective content encryption and digital fingerprint,”J.Appl.RemoteSens., vol. 6, no. 1, p. 063505, 2012. [5] L. Jiang and Z. Xu, “Commutative encryption and watermarking for remote sensing image,” Int. J. Digital Content Technol. Appl., vol. 6, no. 4, pp. 197–205, 2012. [6] L. Jiang, Z. Xu, and Y. Xu, “A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking,” in Proc. IEEE Int. Geosci. Remote Sens. Symp., 2013, pp. 2577–2580. [7] S. Mallat, “The theory for multiresolution signal decomposition: The wavelet representation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 7, pp. 654–693, 1989.