SlideShare a Scribd company logo
Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 
www.ijera.com 38 | P a g e 
Wavelet Based Image Watermarking 
Arun Babu Asst. Professor, Dept. of ECE Heera College of Engineering and Technology Trivandrum, Kerala Abstract here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature. 
Keywords: Watermarking, Wavelet transform, embedding algorithm, detection algorithm, human visual system 
I. INTRODUCTION 
Multimedia services have witnessed a splendid growth in recent years. This progress has created an everincreasing need for techniques that can be used to support some security issues such as copyright protection, copy protection, fingerprinting and authentication. Digital watermarking technology is an emerging field in computer science, cryptography, signal processing and communications. Digital watermarking is intended by its developers as the solution to the need to provide value added protection on top of data encryption and scrambling for content protection. In this paper, the special focus is done with copyright protection of digital images. Digital watermarking is a method that can be used to resolve this issue. In this means, the digital watermarking is considered as a way of embedding the copyright information (a symbol of identification) into an image such that the watermark data is perceptuallyinvisible and robust. Algorithm robustness is important from different point of views. In copyright protection an algorithm should be robust against all kinds of removal attacks including common signal processing distortions which an image encounters during transmission, and malicious removing attacks. In this regard, many different types of approaches have been reported in the literature. Some of them simplywork in spatial domain. At present, these algorithms are not in wide use; since their general robustness does not seem adequate. Some other algorithms use different types of 2-D image transforms to embed their watermark signal more robustly. Amongst these wavelet-based algorithms seem to be more promising. The wavelet-based algorithms have shown to be much more robust and perform greater perceptual invisibility than others [1, 2, and 3]. Some wavelet- 
based algorithm have been designed to embed the watermark signal into the lower level sub bands. Most of them do not consider the fact that embeddingwatermark in higher-level sub bands makes the algorithm much more robust due to quality degradation.In this paper, we present a robust multi- resolution image watermarking method with application to copyrightprotection of images. This method explicitly exploits the human visual system to guarantee that the embeddedwatermark is imperceptible. The proposed algorithm saves the image quality in spite of changing all waveletCoefficients of original image. In order to support algorithm robustness, the proposed algorithm is highly image dependent.We have described the proposed watermark embedding and detection system in Section 2. The experimental results are given in Section 3, followed by conclusion expression in Section 4. 
FIGURE I: GENERAL PROCESS OF IMAGE WATERMARKING 
RESEARCH ARTICLE OPEN ACCESS
Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 
www.ijera.com 39 | P a g e 
II. PREVIOUS WORK 
There have been many proposed novel techniques to hide watermark in digital images. These techniques can be Maintaining the Integrity of the Specifications classified into different categories according to several criteria .The first criterion is the type of domain in which the data embedding takes place. There are two major domain types,spatial and transform domains. The transform domain image is represented in terms of its frequencies; however, in spatial domain it is represented by pixels. The second criterion is according to the ability of watermark to resist attack; fragile watermarks are ready to be destroyed by random image processing methods, the change in watermark is easy to bedetected, thus can provide information for image completeness, robust watermarks are robust under most image processing methods can be extracted from heavily attackedwatermarked image. 
A. Spatial Domain (Additive Watermarking ) 
The most straightforward method for embedding the watermark in spatial domain is to add pseudo random noise pattern to the intensity of image pixels. The noise signal is usually integers like (-1,0,1) or sometimes floating point numbers. Least Significant Bit Modification A digital image version of this analogue image contains sampled values of the function at discrete locations or pixels.These values are said to be the representation of the image inthe spatial domain or often referred to as the pixel domain. Spatial embedding inserts message into image pixels. 
B. Transform Domain 
Transform domain embeds a message by modifying the transform coefficients of the cover message as opposed to the pixel values. Ideally, transform domain has the effect in the spatial domain of apportioning the hidden information through different order bits in a manner that is robust. There are a number of transforms that can be applied to digital images, but there are notably three most commonly used in image watermarking. They are Discrete Fourier Transform(DFT), Discrete Cosine Transform (DCT) and DiscreteWavelet Transform (DWT). 
Discrete Fourier Transform Fourier Transform (FT) is an operation that transforms a continuous function into its frequency components. The equivalent transform for discrete valued function requires the Discrete Fourier Transform (DFT). In digital image processing, the even functions that are not periodic can be expressed as the integral of sine and/or cosine multiplied by a weighing function. This weighing function makes up the coefficients of the Fourier Transform of the signal. Fourier Transform allows analysis and processing of the signal in its frequency domain by means of analyzing and modifying these coefficients. Discrete Cosine Transform : Discrete Cosine Transform is related to DFT in a sense that it transforms a time domain signal into its frequency components. The DCT however only uses the real parts of the DFT coefficients. In terms of property, the DCT has a strong energy compaction property and most of the signal information tends to be concentrated in a few low-frequencycomponents of the DCT. The JPEG compression techniqueutilizes this property to separate and remove insignificant high frequency components in images. Discrete Wavelet Transform : Wavelet Transform is a modern technique frequently used in digital image processing, compression, watermarking etc. The transforms are based on small waves, called wavelet, of varying frequency and limited duration. A wavelet series is a representation of a square- integrable function by a certain ortho-normal series generated by a wavelet. Furthermore, the properties of wavelet could decompose original signal into wavelet transform coefficients which contains the position information. The original signal can be completely reconstructed by performing Inverse Wavelet Transformation on these coefficients. Watermarking in the wavelet transform domain is generally a problem of embedding watermark in the sub bands of the cover image. 
III. SYSTEM DESCRIPTION 
The block diagram of the proposed image adaptive watermarking algorithm is shown in figure II. As this figure shows, the proposed watermarking algorithm consists of three main steps. In the first step, we decompose an image into its n-level wavelet decomposition coefficients. As Daubechies is in wide-use in most image processing works, we have also chosen to use this filter as our basis function (there are many references which support this idea from theoretical point of view, some proof can be find in [4,5,6]). In the second step, the watermark embedding step, the wavelet coefficients are used to embed the watermark strongly in perceptually most significant parts of the original image. Let Ỉ, W, W* denote the wavelet coefficients of the original image, the original watermark, and the weighted watermark, respectively. So, 
As equation (1) shows, * W is highly image dependent and its weights increase significantly in the perceptually important parts of the original image. Subsequently, we employ a thresholding procedure to encounter the properties of human visual system. In this procedure, we use the threshold level of noise
Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 
www.ijera.com 40 | P a g e 
visibility in different bands of wavelet decomposition of the image [4] to keep the watermark level under the threshold of visibility. Then, the watermark signal is added to the original image to construct the wavelet coefficients of the watermarked image. Then we have: 
FIGURE II: HIGH LEVEL BLOCK OF THE SYSTEM Where Ỉ, denotes the wavelet coefficients of the watermarked image and W** denotes the threshold version of the original watermark signal. In the third step, the inverse wavelet transform of the watermarked image is computed to produce the watermarked image in spatial domain. Obviously, although we have changed all wavelet coefficients of the original image, our weighting function and its subsequent thresholding schemes aredesigned in such a way that it provides us with a robust algorithm, which preserves image quality very well. 
In the watermark detection step, the wavelet representations of the received image and the original image are both computed. Then, the wavelet coefficients of the original image are subtracted from the wavelet coefficients of the received image (to extract the existing watermark from the received image). This by, we have obtained the threshold version of embedded watermark (W**). Furthermore, as in [7, 8] the thresholding error is modeled as an additive Gaussian noise. Here, we have considered the probability distribution function of extracted watermark to have the same probability distribution function as the original watermark (W). Consequently, we can now simply use the Cox similarity model [7] to determine whether or not the existing watermark is the initially inserted signal. In the next section, we will give our experimental results to prove our claims regarding the image quality and the algorithm robustness. 
IV. IVEXPERIMENTAL RESULTS 
A number of experiments are performed on the watermarked image to test the resilience of the proposed scheme towards common image processing attacks. 512x512 gray scale Lena and baboon images are used as cover image and watermark image respectively. These images are shown following.
Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 
www.ijera.com 41 | P a g e 
FIGURE III. WATERMARK DETECTOR RESPONSE TO 1000 RANDOMLY GENERATED WATERMARKS. THE THRESHOLD LEVEL IS DRAWN FOR EASE OF COMPARISON. 
FIGURE IV. WATERMARK DETECTOR RESPONSE AGAINST DIFFERENT LEVELS OF ADDITIVE GAUSSIAN NOISE. 
FIGURE V: WATERMARK DETECTOR RESPONSE TO 1000 RANDOMLY GENERATED ATERMARKS USING JUST THE LOWEST RESOLUTION BANDS AS DETECTOR INPUT.
Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 
www.ijera.com 42 | P a g e 
FIGURE VI VI.COMPARISON FOR VARIOUS IMAGES 
V. CONCLUSION AND FUTURE SCOPE 
In this paper, a digital image watermarking technique based on discrete wavelet transform and discrete cosinetransform has been presented, where the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficients. And the watermark is added in select coefficients with significantimage energy in the discrete wavelet transform domain in order to ensure non- erasability of the watermark. Experimental results demonstrate that the watermark is robust to most of the signal processing techniques and geometric distortions. Result suggest that the proposed scheme can be used to extract a good quality watermark for various image processing attacks like JPEG compression, average filtering, median filtering and cropping. There is a scope of future work in this dissertation, as is observed from the qualitative results that the proposed scheme shows comparable results with that of the scheme proposed by earlier. These results can be improved to increase the utility of the proposed scheme for varying levels of compression. REFERENCES [1] C. I. Podilchuk and E. J. Delp, Digital watermarking: algorithm and application, IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 346, 2001. [2]. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image proessing, vol. 6, no. 12, pp,16731687, 1997. [3]. H. J. M. Wang, P. C. Su, and C. C. J Kuo, Wavelet- base digital image watermarking, Opt. Express, Vol.3, No.12, pp.491496, Dec.1998. [4]. F. Y. Shih and S. Y. T. Wu, Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, vol. 36, no. 4, pp. 969975, 2002. 
[5]. C.-S. Shieh, H.-C. Huang, F.-H.Wang, and J.-S. Pan, Genetic watermarking based on transform-domain techniques, Pattern Recognition, vol. 37, no. 3, pp. 555565, 2004. 
[6]. P. Tao and A. M. Eskicioglu, A robust multiple watermarking scheme in the discrete wavelet transform domain, in Internet Multimedia Management Systems V, Proceedings of SPIE, pp. 133144, Philadelphia, Pa, USA, October 2004. [7]. A. Bors and I. Pitas, Image watermarking using DCT domain contraints in Proc. IEEE. Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, pp. 231-234. [8]. Yusnita Yusof and Othman O. Khalifa, (2007), Digital Watermarking For Digital Images Using Wavelet Transform, IEEE. [9]. Hiroyuki Kii, Junji Onishi, Shinji Ozawa, (1999) The Digital Watermarking Method by Using both Patchwork and DCT, IEEE. [10]. A. Piva, M. Barni, F. Berbolini and V. Cappellini, DCT based watermark recovery without resorting to the uncorrupted original image, Proc. IEEE Intern. Conf. on Image Processing, ICIP97, Santa Barbara, California USA, Vol. 1, October 1997. [11]. A. S. Lewis and G. Knowles, Image compression using the 2- D wavelet transform, IEEE Transactions of Image Processing, vol. 1, no. 2, pp. 244250, 1992. 27 [12]. M. Barni, F. Bartolini, V. Cappellini, A. Lippi and A. Piva, A DWT based technique for spatio-frequence masking of digital signature, Proc. of the 11th SPIE Annual Symposium, Electronic Imaging 99, Security

More Related Content

PDF
Digital Image Watermarking Basics
PDF
Comparison of Wavelet Watermarking Method With & without Estimator Approach
PDF
1674 1677
PDF
High Speed and Area Efficient 2D DWT Processor Based Image Compression
PDF
Image Authentication Using Digital Watermarking
PPTX
Wavelet based image compression technique
PDF
I43014752
PDF
Of3424832487
Digital Image Watermarking Basics
Comparison of Wavelet Watermarking Method With & without Estimator Approach
1674 1677
High Speed and Area Efficient 2D DWT Processor Based Image Compression
Image Authentication Using Digital Watermarking
Wavelet based image compression technique
I43014752
Of3424832487

What's hot (19)

PDF
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
PDF
Video Denoising using Transform Domain Method
DOCX
Thesis on Image compression by Manish Myst
PDF
50120140506015
PDF
PDF
Li3420552062
PDF
Ec36783787
PDF
A High Performance Modified SPIHT for Scalable Image Compression
PDF
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
PDF
IRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
PDF
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
PDF
G0352039045
PDF
Image compression techniques by using wavelet transform
PDF
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
PDF
K42016368
PDF
Paper id 212014133
PDF
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
PDF
E1083237
PDF
Deep Learning Based Voice Activity Detection and Speech Enhancement
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Video Denoising using Transform Domain Method
Thesis on Image compression by Manish Myst
50120140506015
Li3420552062
Ec36783787
A High Performance Modified SPIHT for Scalable Image Compression
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
G0352039045
Image compression techniques by using wavelet transform
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization
K42016368
Paper id 212014133
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
E1083237
Deep Learning Based Voice Activity Detection and Speech Enhancement
Ad

Similar to Wavelet Based Image Watermarking (20)

PDF
Psnr value of digital image watermarking by using
PDF
A Review on Robust Digital Watermarking based on different Methods and its Ap...
PDF
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
PDF
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
PDF
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
PDF
Ijetcas14 528
PDF
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
PDF
Ah04605234238
PDF
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
PDF
Kt3618371840
PDF
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
PDF
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PDF
IRJET-A Blind Watermarking Algorithm
PDF
IRJET-A Blind Watermarking Algorithm
PDF
A Blind Watermarking Algorithm
PDF
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
PDF
Comparison of Invisible Digital Watermarking Techniques for its Robustness
PDF
Jq3417501753
PDF
Commutative approach for securing digital media
Psnr value of digital image watermarking by using
A Review on Robust Digital Watermarking based on different Methods and its Ap...
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
Ijetcas14 528
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
Ah04605234238
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
Kt3618371840
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
A Blind Watermarking Algorithm
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Jq3417501753
Commutative approach for securing digital media
Ad

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PPTX
Sustainable Sites - Green Building Construction
PPTX
web development for engineering and engineering
PPTX
Current and future trends in Computer Vision.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Well-logging-methods_new................
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
PPT on Performance Review to get promotions
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
OOP with Java - Java Introduction (Basics)
PDF
composite construction of structures.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Mechanical Engineering MATERIALS Selection
Sustainable Sites - Green Building Construction
web development for engineering and engineering
Current and future trends in Computer Vision.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
III.4.1.2_The_Space_Environment.p pdffdf
Operating System & Kernel Study Guide-1 - converted.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Foundation to blockchain - A guide to Blockchain Tech
Automation-in-Manufacturing-Chapter-Introduction.pdf
R24 SURVEYING LAB MANUAL for civil enggi
Well-logging-methods_new................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPT on Performance Review to get promotions
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
OOP with Java - Java Introduction (Basics)
composite construction of structures.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems

Wavelet Based Image Watermarking

  • 1. Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 www.ijera.com 38 | P a g e Wavelet Based Image Watermarking Arun Babu Asst. Professor, Dept. of ECE Heera College of Engineering and Technology Trivandrum, Kerala Abstract here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature. Keywords: Watermarking, Wavelet transform, embedding algorithm, detection algorithm, human visual system I. INTRODUCTION Multimedia services have witnessed a splendid growth in recent years. This progress has created an everincreasing need for techniques that can be used to support some security issues such as copyright protection, copy protection, fingerprinting and authentication. Digital watermarking technology is an emerging field in computer science, cryptography, signal processing and communications. Digital watermarking is intended by its developers as the solution to the need to provide value added protection on top of data encryption and scrambling for content protection. In this paper, the special focus is done with copyright protection of digital images. Digital watermarking is a method that can be used to resolve this issue. In this means, the digital watermarking is considered as a way of embedding the copyright information (a symbol of identification) into an image such that the watermark data is perceptuallyinvisible and robust. Algorithm robustness is important from different point of views. In copyright protection an algorithm should be robust against all kinds of removal attacks including common signal processing distortions which an image encounters during transmission, and malicious removing attacks. In this regard, many different types of approaches have been reported in the literature. Some of them simplywork in spatial domain. At present, these algorithms are not in wide use; since their general robustness does not seem adequate. Some other algorithms use different types of 2-D image transforms to embed their watermark signal more robustly. Amongst these wavelet-based algorithms seem to be more promising. The wavelet-based algorithms have shown to be much more robust and perform greater perceptual invisibility than others [1, 2, and 3]. Some wavelet- based algorithm have been designed to embed the watermark signal into the lower level sub bands. Most of them do not consider the fact that embeddingwatermark in higher-level sub bands makes the algorithm much more robust due to quality degradation.In this paper, we present a robust multi- resolution image watermarking method with application to copyrightprotection of images. This method explicitly exploits the human visual system to guarantee that the embeddedwatermark is imperceptible. The proposed algorithm saves the image quality in spite of changing all waveletCoefficients of original image. In order to support algorithm robustness, the proposed algorithm is highly image dependent.We have described the proposed watermark embedding and detection system in Section 2. The experimental results are given in Section 3, followed by conclusion expression in Section 4. FIGURE I: GENERAL PROCESS OF IMAGE WATERMARKING RESEARCH ARTICLE OPEN ACCESS
  • 2. Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 www.ijera.com 39 | P a g e II. PREVIOUS WORK There have been many proposed novel techniques to hide watermark in digital images. These techniques can be Maintaining the Integrity of the Specifications classified into different categories according to several criteria .The first criterion is the type of domain in which the data embedding takes place. There are two major domain types,spatial and transform domains. The transform domain image is represented in terms of its frequencies; however, in spatial domain it is represented by pixels. The second criterion is according to the ability of watermark to resist attack; fragile watermarks are ready to be destroyed by random image processing methods, the change in watermark is easy to bedetected, thus can provide information for image completeness, robust watermarks are robust under most image processing methods can be extracted from heavily attackedwatermarked image. A. Spatial Domain (Additive Watermarking ) The most straightforward method for embedding the watermark in spatial domain is to add pseudo random noise pattern to the intensity of image pixels. The noise signal is usually integers like (-1,0,1) or sometimes floating point numbers. Least Significant Bit Modification A digital image version of this analogue image contains sampled values of the function at discrete locations or pixels.These values are said to be the representation of the image inthe spatial domain or often referred to as the pixel domain. Spatial embedding inserts message into image pixels. B. Transform Domain Transform domain embeds a message by modifying the transform coefficients of the cover message as opposed to the pixel values. Ideally, transform domain has the effect in the spatial domain of apportioning the hidden information through different order bits in a manner that is robust. There are a number of transforms that can be applied to digital images, but there are notably three most commonly used in image watermarking. They are Discrete Fourier Transform(DFT), Discrete Cosine Transform (DCT) and DiscreteWavelet Transform (DWT). Discrete Fourier Transform Fourier Transform (FT) is an operation that transforms a continuous function into its frequency components. The equivalent transform for discrete valued function requires the Discrete Fourier Transform (DFT). In digital image processing, the even functions that are not periodic can be expressed as the integral of sine and/or cosine multiplied by a weighing function. This weighing function makes up the coefficients of the Fourier Transform of the signal. Fourier Transform allows analysis and processing of the signal in its frequency domain by means of analyzing and modifying these coefficients. Discrete Cosine Transform : Discrete Cosine Transform is related to DFT in a sense that it transforms a time domain signal into its frequency components. The DCT however only uses the real parts of the DFT coefficients. In terms of property, the DCT has a strong energy compaction property and most of the signal information tends to be concentrated in a few low-frequencycomponents of the DCT. The JPEG compression techniqueutilizes this property to separate and remove insignificant high frequency components in images. Discrete Wavelet Transform : Wavelet Transform is a modern technique frequently used in digital image processing, compression, watermarking etc. The transforms are based on small waves, called wavelet, of varying frequency and limited duration. A wavelet series is a representation of a square- integrable function by a certain ortho-normal series generated by a wavelet. Furthermore, the properties of wavelet could decompose original signal into wavelet transform coefficients which contains the position information. The original signal can be completely reconstructed by performing Inverse Wavelet Transformation on these coefficients. Watermarking in the wavelet transform domain is generally a problem of embedding watermark in the sub bands of the cover image. III. SYSTEM DESCRIPTION The block diagram of the proposed image adaptive watermarking algorithm is shown in figure II. As this figure shows, the proposed watermarking algorithm consists of three main steps. In the first step, we decompose an image into its n-level wavelet decomposition coefficients. As Daubechies is in wide-use in most image processing works, we have also chosen to use this filter as our basis function (there are many references which support this idea from theoretical point of view, some proof can be find in [4,5,6]). In the second step, the watermark embedding step, the wavelet coefficients are used to embed the watermark strongly in perceptually most significant parts of the original image. Let Ỉ, W, W* denote the wavelet coefficients of the original image, the original watermark, and the weighted watermark, respectively. So, As equation (1) shows, * W is highly image dependent and its weights increase significantly in the perceptually important parts of the original image. Subsequently, we employ a thresholding procedure to encounter the properties of human visual system. In this procedure, we use the threshold level of noise
  • 3. Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 www.ijera.com 40 | P a g e visibility in different bands of wavelet decomposition of the image [4] to keep the watermark level under the threshold of visibility. Then, the watermark signal is added to the original image to construct the wavelet coefficients of the watermarked image. Then we have: FIGURE II: HIGH LEVEL BLOCK OF THE SYSTEM Where Ỉ, denotes the wavelet coefficients of the watermarked image and W** denotes the threshold version of the original watermark signal. In the third step, the inverse wavelet transform of the watermarked image is computed to produce the watermarked image in spatial domain. Obviously, although we have changed all wavelet coefficients of the original image, our weighting function and its subsequent thresholding schemes aredesigned in such a way that it provides us with a robust algorithm, which preserves image quality very well. In the watermark detection step, the wavelet representations of the received image and the original image are both computed. Then, the wavelet coefficients of the original image are subtracted from the wavelet coefficients of the received image (to extract the existing watermark from the received image). This by, we have obtained the threshold version of embedded watermark (W**). Furthermore, as in [7, 8] the thresholding error is modeled as an additive Gaussian noise. Here, we have considered the probability distribution function of extracted watermark to have the same probability distribution function as the original watermark (W). Consequently, we can now simply use the Cox similarity model [7] to determine whether or not the existing watermark is the initially inserted signal. In the next section, we will give our experimental results to prove our claims regarding the image quality and the algorithm robustness. IV. IVEXPERIMENTAL RESULTS A number of experiments are performed on the watermarked image to test the resilience of the proposed scheme towards common image processing attacks. 512x512 gray scale Lena and baboon images are used as cover image and watermark image respectively. These images are shown following.
  • 4. Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 www.ijera.com 41 | P a g e FIGURE III. WATERMARK DETECTOR RESPONSE TO 1000 RANDOMLY GENERATED WATERMARKS. THE THRESHOLD LEVEL IS DRAWN FOR EASE OF COMPARISON. FIGURE IV. WATERMARK DETECTOR RESPONSE AGAINST DIFFERENT LEVELS OF ADDITIVE GAUSSIAN NOISE. FIGURE V: WATERMARK DETECTOR RESPONSE TO 1000 RANDOMLY GENERATED ATERMARKS USING JUST THE LOWEST RESOLUTION BANDS AS DETECTOR INPUT.
  • 5. Arun Babu Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.38-42 www.ijera.com 42 | P a g e FIGURE VI VI.COMPARISON FOR VARIOUS IMAGES V. CONCLUSION AND FUTURE SCOPE In this paper, a digital image watermarking technique based on discrete wavelet transform and discrete cosinetransform has been presented, where the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficients. And the watermark is added in select coefficients with significantimage energy in the discrete wavelet transform domain in order to ensure non- erasability of the watermark. Experimental results demonstrate that the watermark is robust to most of the signal processing techniques and geometric distortions. Result suggest that the proposed scheme can be used to extract a good quality watermark for various image processing attacks like JPEG compression, average filtering, median filtering and cropping. There is a scope of future work in this dissertation, as is observed from the qualitative results that the proposed scheme shows comparable results with that of the scheme proposed by earlier. These results can be improved to increase the utility of the proposed scheme for varying levels of compression. REFERENCES [1] C. I. Podilchuk and E. J. Delp, Digital watermarking: algorithm and application, IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 346, 2001. [2]. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image proessing, vol. 6, no. 12, pp,16731687, 1997. [3]. H. J. M. Wang, P. C. Su, and C. C. J Kuo, Wavelet- base digital image watermarking, Opt. Express, Vol.3, No.12, pp.491496, Dec.1998. [4]. F. Y. Shih and S. Y. T. Wu, Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, vol. 36, no. 4, pp. 969975, 2002. [5]. C.-S. Shieh, H.-C. Huang, F.-H.Wang, and J.-S. Pan, Genetic watermarking based on transform-domain techniques, Pattern Recognition, vol. 37, no. 3, pp. 555565, 2004. [6]. P. Tao and A. M. Eskicioglu, A robust multiple watermarking scheme in the discrete wavelet transform domain, in Internet Multimedia Management Systems V, Proceedings of SPIE, pp. 133144, Philadelphia, Pa, USA, October 2004. [7]. A. Bors and I. Pitas, Image watermarking using DCT domain contraints in Proc. IEEE. Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, pp. 231-234. [8]. Yusnita Yusof and Othman O. Khalifa, (2007), Digital Watermarking For Digital Images Using Wavelet Transform, IEEE. [9]. Hiroyuki Kii, Junji Onishi, Shinji Ozawa, (1999) The Digital Watermarking Method by Using both Patchwork and DCT, IEEE. [10]. A. Piva, M. Barni, F. Berbolini and V. Cappellini, DCT based watermark recovery without resorting to the uncorrupted original image, Proc. IEEE Intern. Conf. on Image Processing, ICIP97, Santa Barbara, California USA, Vol. 1, October 1997. [11]. A. S. Lewis and G. Knowles, Image compression using the 2- D wavelet transform, IEEE Transactions of Image Processing, vol. 1, no. 2, pp. 244250, 1992. 27 [12]. M. Barni, F. Bartolini, V. Cappellini, A. Lippi and A. Piva, A DWT based technique for spatio-frequence masking of digital signature, Proc. of the 11th SPIE Annual Symposium, Electronic Imaging 99, Security