- Open Access
- Total Downloads : 14
- Authors : Miss. Jagadevi Methre, Mr. Sanjeevi Kumar P
- Paper ID : IJERTCONV3IS19174
- Volume & Issue : ICESMART – 2015 (Volume 3 – Issue 19)
- Published (First Online): 24-04-2018
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Hybrid Watermarking with Reduction of Noises for Color Image
Miss: Jagadevi Methre
Dept, of ECE
Mangalore Institute of Technology and Engineering Moodbidri Mangalore, India.
Abstract-The method to protect digital data in communication such as text, images, audio and video from content modification, is called digital watermarking. Here we have proposed a new watermarking scheme based on DCT- DWT-SVD. The performance results also shown here. The techniques are used here are non-blind techniques. First technique uses SVD of DC coefficients using 2D-DWT and another considers SVD of all DCT values of 2D-DWT of main image. To check the robustness PSNR and Normalized cross- correlation are used
Keywords: Watermark; DWT; DCT; SVD; PSNR; NCC.
I.INTRODUCTION
With development communication methods like web communication and multimedia technology, the transmission of digital data has been increased so there are risks of security attacks. With the good communication, secured communication is also required now. For this secure communication the technique is called digital watermark technique has been adapted. This is the process to embedding the data into digital media like image, audio and video.Watermarking can be divided into two (i) spatial or transform domain [11]. (ii) According to visibility (visible or invisible).The quality of watermarking attacks[3].middle band
attacks[3].Middle band coefficient of DCT based watermarking scheme is given for image authentication. DWT is applied then after DCT of LL is computed. Then mid band coefficient is selected and SVD is applied on it. It is very robust against JPEG compression[4].R. Mehul has suggested that to get robustness for vast range of attacks watermark insertion can be performed in both low and high value coefficients[5]. Authors proposed color image watermarking using second level DWT decomposition and block base DCT. First they divide color image into three channels Red, Green and Blue and then apply DWT to selected color and select HL or LH band for further decomposition. They selected low and high frequency band so robustness and imperceptibility result is very good[6]. A hybrid block based technique is proposed by V. Santhi. In that First singular value is selected for watermark embedding in all different band after first level decomposition[7]. A hybrid technique based on SVD and DCT is proposed. More transparency is obtained using only Singular values of a recognized pattern and LPSNR is Adopted to achieve high robustness[8]. Author proposed
Mr. Sanjeevi Kumar P
Asst professor Dept, of ECE Mangalore Institute of Technology and Engineering
Moodbidri Mangalore, India
can be evaluated using robustness, behavior and capacity. any watermarking scheme is robust if it performs better in various attacks[15, 16]. Behavior of watermarking scheme can be determined after inserting the watermark. If image is getting distorted after insertion of watermark then the scheme is not good in behavior (transparency) [13, 14].Capacity is the measurement of the data to be inserted in the cover image. If the capacity is more, then large data can be hide.
II RELATEDWORK
Authors proposed watermarking algorithm based on DWT- DCT and SVD. They apply one level DWT decomposition of cover image and select LL band for watermarking[1]. In this paper DC coefficient based watermarking scheme for color image is suggested. They apply wavelet decomposition one level to color image. Then divide the selected band into 4X4 subblocks and DCT is applied. First DCT value is selected from all subblocks. Then SVD is performed on that. The method is tested against various attacks and result is good for LL band in compare to other band[2].Robust watermarking scheme is proposed by Navas. In that they combine advantage of three techniques(DCT-DWT-SVD).scheme is very robust for different kind of image processing
watermarking scheme based on DCT-DWT-SVD. They apply second level decomposition of cover image. DCT is apply to second level HL coefficient and divide it into four quadrant using zigzag sequence. SVD is applied to each Quadrant and modified with SVD of watermark. Algorithm gives good PSNR and also robust to various attacks. Quadrant B1 gives good results compare to other three[9]. Author proposed watermarking scheme based on DWT and SVD using all four frequency bands. Singular values of watermark is inserted into all four frequency bands singular values after first level DWT. Experimental results shows that LL gives highest magnitude of wavelet coefficient as well as of singular values[10].
Most of watermarking scheme mentioned above is used gray scale image as cover image and binary or gray scale watermark. In proposed scheme colour image is used as cover image and as watermark image. There for capacity is increased. To achieve robustness against different attacks watermark is embedded in lower band and to get good transparency modification is done in singular values. DCT gives best result against compression there fore to
overcome problems of compression attacks in existing techniques in second technique we apply DCT to both cover image as well as watermark.
-
PROPOSED ALGORITHM I
Proposed algorithm combines merits of three different techniques DCT, DWT and SVD. First the original color image is selected and apply one level DWT to it. The LL band is select for second level decomposition and HH band is selected To achieve imperceptibility. It is divided into 4X4 subblocks. DCT is applied to each subblocks and first DC coefficient of each block is selected and formed it in matrix. To this matrix SVD is applied and singular values are modified with singular values of watermark. Inverse SVD, IDCT and IDWT is performed to get watermarked image.
The procedure for embedding and extracting the watermark is given below.
A Watermark embed process
The embedding process is divided into following steps and is briefly described as given below:
-
The original image OI of size NxN and color channel are selected. DWT is applied to decompose into four N/2xN/2 sub-bands LL,HL,LH and HH.
-
Apply DWT to LL sub-band to decompose it into four N/4xN/4 LL_LL,LL_HL, LL_LH,LL_HH.
-
Divide LL_HH band into 4×4 square blocks apply DCT to it and select first DCT value of each block to get DCT coefficient matrix B
-
Apply SVD to B,B=U1*S1*V1T, and obtain U1, S1 and V1.
-
Let OW of size N/16xN/16 to represent watermark. Apply SVD to it, OW= W_U*W_S*W_V and obtain W_U, W_ S and W_V.
-
Modify S1 with watermark such that S=S1+a*WS and Obtain B* using B*=U*S*VT.
-
Apply IDCT to B*to produce LL_HH*.
-
Apply IDWT to LL_LL, LL_HL, LL_LH and LL_HH* to get matrix LL*.
-
Apply IDWT to LL*,HL ,LH and HH, set it to selected color channel to get watermarked image WI.
-
Watermark Extraction Process
The extraction process is divided into following steps and is briefly described as given below:
-
Color channel is selected and DWT is applied to WI to get LL*,HL,LH and HH.
-
DWT is applied to WI to get LL_LL,LL_HL,LL_LH and LL_HH*.
-
Divide LL_HH band into 4X4 square blocks.
-
The DCT is applied to each block of sub band LL_HH*,select first DCT values and get matrix
A.
-
SVD is applied to matrix A, A=WU*WS*WVT and obtain WU,WS,WV
-
Obtain SW=(S-WS) /a.
-
Obtain EW=W_U*SW*W_VT
-
-
-
PROPOSED ALGORITHM II
In this algorithm first level decompositionof wavelet is applied to cover image then LL band is selected for second level decomposition and its HH band is selected. Now DCT is applied to this band and get DCT coefficient matrix. SVD is performed on this DCT coefficient matrix. Watermark image is decomposed at first level and HH band is selected. DCT is applied to this HH band and we get DCT coefficients of watermark then SVD is applied to it. Singular values of cover image DCT coefficients is modified with singular values of watermark. Perform inverse transform and we get watermark image.
-
Watermark embedding process
The embedding process is divided into following steps and is briefly described as given below:
-
Let OI be the Original color image of size NxN.
-
From R,G,B(1,2,3) select any one color component. Suppose for Red color select(:,:,1) from original image.
-
DWT is applied to decompose it into four N/2xN/2 sub-bands LL, HL, LH and HH.
-
Apply DWT to LL band to decompose it into four N/4 x N/4 sub-bands LL_LL,LL_HL, LL_LH and LL_HH.
-
Apply DCT to LL_HH and get DCT coefficient matrix B.
-
Apply SVD to matrix B, B=U*S* V1T, and obtain U, S and V.
-
Let watermark of size N/2xN/2 to represent watermark. Apply DWT to decompose it into four N/4xN/4 sub-bands WLL, WHL, WLH and WHH
-
The WHH band is selected and apply DCT to it and get DCT coefficient matrix D
-
Apply SVD to matrix D, D=U1*S1* V1T, and obtain U1, S1 andV1
-
Modify S with watermark such that S2=S+ a*S1.
-
Obtain B* using B*=U*S2* V1T.
-
Apply IDCT to B*to produce LL_HH*.
-
Apply inverse DWT to LL_LL,LL_HL,LL_LH and LL_HH* to get LL*.
-
Apply inverse DWT to LL*,HL, LH and HH to get watermarked image color name_ WI for selected color component.
-
Set value of that component to Original color image.
-
Get color watermarked image WI.
-
-
Watermark Extraction Process
The extraction process is divided into following steps and is briefly described as given below:
-
watermarked image color component is selected.
-
Apply DWT to WI to get LL*,HL,LH and HH.
-
Apply DWT to WI to get LL_LL,LL_HL,LL_LH and LL_HH*.
-
Select LL_HH* band and apply DCT to subband HH* and get matrix A.
-
Apply SVD to A, A=WU*WS*WVT and obtain WU,WS,WV.
-
Obtain Sr =(S-WS)/a.
-
Obtain Wr=U1*Sr* V1T.
-
-
Apply inverse DCT to Wr and get W.
-
Apply inverse DWT to LL,HL,LH and W and get extracted watermark.
-
-
EVALUATION PARAMETERS The PSNR and NCC are used as evaluation parameter.
Peak Signal to Noise Ratio (PSNR), is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. Let A is the original image &B is the watermarked image of size m x n then MSE(Mean Square Error) & PSNR will be
MSE = 1 (( )1 1) (1)
Fig.1 image database.
Fig.2 Original color image.
=0 =0
PSNR=10. log 10(MAX2 A/MSE) (2)
Normalized cross correlation is calculated to evaluate the robustness of algorithm NCC is defined as follows where OW is original watermark and EW is Extracted watermark.
=0 =0 =0 =0
=0 =0 =0 =0
NC=( )1 1 ( )1 1 (3) EXPERIMENT RESULTS
The efficiency of proposed algorithm for different images are considered for numerical simulation. It is tested using the tool MATLAB 2013. Here results are given using 512 x 512 color image PEPPER, as cover image and 32 x 32 color fruits as watermark in algorithm one and 256 x256 color PEPPER in both algorithm.
Fig.3 Original watermark image
Fig.4 Attacked image.
Fig.5 Extracted image.
CONCLUSION
The extraction of watermark does not depend on the original cover image.
-
In the proposed algorithm the features of DWT-DCT- SVD techniques are combined.
-
Embedding of watermark is done only in DC components of all frequency bands to increase the robustness.
-
Algorithm is tested against many attacks and found to be robust. So that the new system can be used in applications such as copyright protection and ownership verification
-
Watermark embedded in low frequency components are resistant to salt and pepper noise, Gaussian noise, Gaussian blur, cropping, color contrast and compression attacks. Similarly watermarks embedded in high frequency components are resistant to image sharpening, histogram equalization, rotation and resize.
-
It is found that the proposed algorithm is not robust to rotation attack in RGB color space and our future work is to design the new system robust to rotation attack.
REFERENCES
[1]. Nidhi Divecha Dr. N. N. Jani Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color image 2013 International Conference on Intelligent Systems and Signal Processing (ISSP) [2]. BenWang,JinkouDing,QiaoyanWen,Xin Liao, CuixiangLiu An Image Watermarking Algorithm Based On DWT DCT And SVD, Proceedings of IC-NIDC 2009,9781- 4244-4900- 2/09/$25.00©200 IEEE.pp.1034- 1038. [3]. V.Santhiand Dr.Arunkumar Thangavelu DC Coefficients Based Watermarking Technique for color Images Using Singular Value Decomposition, International Journal of Computer and ElectricalEngineering,Vol.3, No.1, February, 2011. 1793-8163. [4]. K A Navas, Mathews Cheriyan Ajay, M Lekshmi, Tampy S Archana M Sasikumar DWT-DCT-SVD Based Watermarking, 3rd International Conference on Communication Systems Software and Middleware and Workshops COMSWARE08 (2008). [5]. S S Bedi, Ashwani Kumar,and Piyush Kapoor Robust Secure SVD Based DCTDWT Oriented Watermarking Technique for Image Authentication, International Conference on IT to Celebrate S.Charmonman's 72nd Birthday, March 2009,Thailand,pp 46.1-46.7. [6]. R.Mehul and R. Priti ,Discrete Wavelet Transform Based Multiple Watermarking Scheme, Proceedings of IEEE Region 10 Technical Conference on Convergent Technologies for the Asia-Pacific,Bangalore, India, October14-17, 2003
-
R.Eswaraiah, Sai Alekhya Edara,E.Sreenivasa Reddy Color Image Watermarking Scheme using DWT and DCT Coefficients of R,G and B Color Components, International Journal of Computer Applications(0975 8887)Volume50 No.8,July 2012.
-
. V.Santhi, N.Rekha, S.ThariniA Hybrid Block Based Watermarking Algorithm using DWT-DCT-SVD Techniques for Color Images, proceedings of International Conference on Computing
,Communication and Networking,2008.ICCCn2008.
-
. Fangjun Huang, Zhi-Hong Guan A hybrid SVD-DCT watermarking method based on LPSNR, Pattern Recognition Letters25(2004)17691775,©2004Elsevier
&SEC'04, Magdeburg, Germany, Copyright2004ACM
[12]. F.Hartungand M. Kutter, Multimedia Watermarking Techniques, in proc. Of the IEEE,vol.87,no.7,pp.1079- 1107, July 1999. [13]. Ali Al-Haj Combined DWT-DCT DigitaImageWatermarking,Journal of computer science3(9),740- 746, ISSN, 2007. [14]. W.Bender,D.Gruhl,N.Morimoto and A. Lu, Techniques for data hiding,, IBM Systems Journal, vol.35, no.3&4,pp. 313-336, 1996. [15]. I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6,no.12,pp.1673-1687, December1997. [16]. J.J.K.0 Ruanaidh, W. J. Dolingand F. M.Boland, Watermarking digital images for copyright protection,IEEE Proceedings-Vision, Image and Signal Processing,vol.143, no. 4, pp. 250-256, August1996. [17]. M. D. Swanson, M. Kobayashi and A. H.Tewfik,Multimediadata-embedding and watermarking techniques, Proceedings of the IEEE, vol.86, no.6,pp.1064-1087,June 1998.