You are on page 1of 8

S Y N O PS I S

On

Combination of Multiple Techniques Used For Combined


Encryption andDigital Watermarking Gives Better
Performance over Individual Techniques for Security of
Still Image

Abstract:Digital Watermarking describes methods and technologies that hide information, for
example a number or text, in digital media, such as images, video or audio. The embedding takes
place by manipulating the content of the digital data, which means the information is not embedded in
the frame around the data. The hiding process has to be such that the modifications of the media are
imperceptible. For images this means that the modifications of the pixel values have to be invisible.
Furthermore, the watermark must be either robust or fragile, depending on the application. By
"robust" we mean the capability of the watermark to resist manipulations of the media, such as lossy
compression (where compressing data and then decompressing it retrieves data that may well be
different from the original, but is close enough to be useful in some way), scaling, and cropping, just
to enumerate some. In some cases the watermark may need to be fragile. "Fragile" means that the
watermark should not resist tampering, or would resist only up to a certain, predetermined extent.
To provide copyright protection to still image various combined encryption and
digital watermarking techniques can be used. Such as, Frequency domain
techniques, Spatial Domain techniques, Fuzzy logic techniques, Neural Network
techniques, Genetic algorithm or combination of all.
Keywords: Watermarking Process, Frequency domain Techniques, Fuzzy logic Techniques,
Neural Network, Genetic Algorithm.

Introduction:Digital communication facilitates transfer of data (such as photo image, video movie
file, or an audio song file). The data can be easily copied and used for different applications. However,
this creates the problem of security or ownership of the digital data. Since long, people are using
watermarking on paper (Example, currency note) as one of the systematic approach to over Energy
Saving and Reliable Data Reduction
Techniques for Single and Multi-Modal WSNs come the issue of copyright or piracy. For digital
data, researchers have developed a similar approach referred as Digital Watermarking. Digital
watermarking is the process of embedding additional information into the existing data. With this
additional information, if the file or data is copied the additional information embedded in the data is
also copied, which is then used to identify the originality of the data. watermarking are the two
methods commonly used. In visible watermarking, the information Visible and invisible is visible.
Generally, the information is text or a logo which appears on the data. For example, a television
broadcaster adds its logo to the corner of transmitted video. The copyright in this case can be easily
detected. In invisible watermarking, information is added as digital data and this is the most widely

used approach in the digital communication to protect the piracy of owners data. For example,
password protected document like income tax statement from IT department of Government of India.
The development of effective digital image copyright protection methods have recently become an
urgent and necessary requirement in the multimedia industry due to the ever-increasing unauthorized
manipulation and reproduction of original digital objects. The new technology of digital watermarking
has been advocated by many specialists as the best method to such multimedia copyright protection
problem. Its expected that digital watermarking will have a wide-span of practical applications such as
digital cameras, medical imaging, image databases, and video-on-demand systems, among many
others. In order for a digital watermarking method to be effective it should be imperceptible, and
robust to common image manipulations like compression, filtering, rotation, scaling cropping, and
collusion attacks among many other digital signal processing operations. Current digital image
watermarking techniques can be grouped into fivemajor classes:
1. Spatial Domain Watermarking
2. Frequency Domain Watermarking
3. Fuzzy Logic Domain Watermarking.
4. Neural Network Domain Watermarking.
5. Genetic Algorithm Domain Watermarking.
1.1
Spatial domain methods. These methods are based on direct modification of the values of the
image pixels, so the watermark has to be imbedded in this way. Such methods are simple and
computationally efficient, because they modify the colour, luminance or brightness values of a digital
image pixels, therefore their application is done very easily, and requires minimal computational
power.
1.2
Frequency (transform) domain methods. These methods are based on the using of some
invertible transformations like discrete cosine transform (DCT), discrete wavelet transform
(DWT),singular value decomposition (SVD) etc. or various combinations of these transforms such as
Combined DWT-DCT, Combined DCT-SVD, CombinedDWT-SVD, Combined DWT-DCT-SVD
Transform to the host image. Embedding of a watermark is made by modifications of the transform
coefficients, accordingly to the watermark or its spectrum. Finally, the inverse transform is applied to
obtain the marked image. This approach distributes irregularly the watermark over the image pixels
after the inverse transform, thus making detection or manipulation of the watermark more difficult.
The watermark signal is usually applied to the middle frequencies of the image, keeping visually the
most important parts of the image (low frequencies) and avoiding the parts (presented by high
frequencies), which are easily destructible by compression or scaling operations. These methods are
more complicated and require more computational power. The rest approaches are based on various
modifications of both methods above, using useful details of them to increase the quality of whole
watermarking process.

1.3
Fuzzy Logic Method: Fuzzy Logic Method for Digital watermarking has been proposed for
copyright protection in our digital society. We propose an adaptive digital watermarking scheme based
on the human visual system model and a fuzzy logic technique. The fuzzy logic approach is employed
to obtain the different strengths and lengths of a watermark by the local characteristics of the image in

our proposed scheme. In our experiments, this scheme provides a more robust and imperceptible
watermark.
1.4
Neural Network Method: Watermarking is an approach to hide information into target
content and retrieve information from the target content without damaging it. With this method, the
use of neural network is the key technique. The embedder adjusts a neural network weights with
desired hidden bit code to target content by supervised learning of the neural network. This
conditioned neural network works as a classifier to recognize a hidden bit pattern from the content
which embedder associates to the target content. Therefore, extractor uses this neural network weights
for extracting the hidden bit codes. For the applications for digital watermarking this extraction keys
must be shared among embedder and extractor in order to extract a proper hidden bit codes from the
target content. Considering the difficulties for secret key transportation, this method should be applied
in situations where the embedder and the extractor are same person or use certification authorities to
assure the integrity of the key. This method can be more secured by applying message digest technique
to the watermarked image. Finally, a study of their result to see which one is the best scheme that
should be used for security of digital still image.
There are various sub techniques for digital watermarking are being used for implementation of
copyright protection explain in figure1.In this research we are going to do comparative study of all
watermarking techniques and enhancing the quality of image before embedding the watermark and
after extraction of watermark as shown in following three figures. The objectives of this research is
that to calculate elapsed time require for embedding the watermark and time require for extraction of
watermark.The main objectives is to maintain the quality of still image by using Combination of
Multiple Techniques Used for Digital Watermarkingto Get Better Performance over Individual
Techniques for Security of Still Image before applying intentional and non-intentional attacks on
watermarked image.

1.5 Genetic Algorithm:Genetic Algorithms (GAs) are adaptive heuristic search algorithm based on
the evolutionary ideas of Genetic Algorithms (GAs) are adaptive heuristic search algorithm based on
the evolutionary ideas of natural selection and genetics. As such they represent an intelligent
exploitation of a random search used to solve optimization problems. Although randomized, GAs are
by no means random, instead they exploit historical information to direct the search into the region of
better performance within the search space. The basic techniques of the GAs are designed to simulate
processes in natural systems necessary for evolution, especially those follow the principles first laid
down by Charles Darwin of "survival of the fittest.". Since in nature, competition among individuals
for scanty resources results in the fittest individuals dominating over the weaker ones. It is better than
conventional AI in that it is more robust. Unlike older AI systems, they do not break easily even if the
inputs changed slightly, or in the presence of reasonable noise. Also, in searching a large state-space,
multi-modal state-space, or n-dimensional surface, a genetic algorithm may offer significant benefits
over more typical search of optimization techniques. (Linear programming, heuristic, depth-first,
breath-first, and praxis)a new method to improve the robustness and imperceptibleness in
watermarking. In this, the singular value of watermark is embedded to singular value of 3rd-level
DWT approximation matrix of original image. The genetic algorithm is used to optimize the scaling
factor with which the watermark is embedded to host image. The algorithm makes use of fitness
function that takes two values PSNR and correlation. Here we also find the transparency and
robustness of watermark under various attacks.

Types of Watermarks:

a) PublicWatermark: Such a watermark can be read or retrieved by anyone using the specialized
algorithm. In this sense, public watermarks are not secure. However, public watermarks are useful for
carrying IPR information. They are good alternatives to labels.

b) Visible watermarks: Visible watermarks are an extension of the concept of logos. Such
watermarks are applicable to images only. These logos are inlaid into the image but they are
transparent. Such watermarks cannot be removed by cropping the center part of the image.
Further, such watermarks are protected against attacks such as statistical analysis.
c) Invisible watermark:Invisible watermark is hidden in the content. It can be detected by
an authorized agency only. Such watermarks are used for content and/or author authentication
and for detecting unauthorized copier.
d) Fragile watermark: Fragile watermarks are also known as tamper-proof watermarks.
Such watermarks are destroyed by data manipulation.
e) Perceptual watermarks: A perceptual watermark exploits the aspects of human sensory
system to provide invisible yet robust watermark.
f) Private Watermark:Private watermarks are also known as secure watermarks. To read or
retrieve such a watermark, it is necessary to have the secret key.
Performance Evaluation Metrics:

Watermarking algorithms are usually evaluated with respect to two metrics: imperceptibility and
robustness. The two metrics are described below.Performance evaluation metrics can be also evaluate
by using image enhancement techniques shown in figure.2
Imperceptibility:
Imperceptibility means that the perceived quality of the hostimage should not be distorted by the
presence of the watermark. As a measure of the quality of a watermarked image, the peak signal to
noise ratio (PSNR) is typically used. PSNR in decibels (dB) is given below Equation.
PSNR db = 10. log 10{ Max21

MSE}

= 20. log 10{ Max21

MSE}

Or

Where x i, j and x^ i, j are the gray-scale values of host and watermarked images and N x N is the size
of image respectively.
Robustness:
Robustness is a measure of the immunity of the watermark against attempts to remove or degrade it,
internationally or unintentionally, by different types of digital signal processing attacks. Robustness
obtained for three major digital signal processing operations (attacks): Gaussian noise, image
compression and image cropping. The three attacks are a few; however, they are good representatives
of the more general attacks. That is the Gaussian noise is a watermark degrading attack, JPEG
compression is a watermark removal attack and cropping is a watermark dis-positioning geometrical
attack. The similarity between the original watermark and the watermark extracted from the attacked
image using Normalized Cross-Correlation(NC) as given below.

Where N is the number of pixels in watermark, w and w are the original and extracted watermarks
respectively. The correlation factor may take values between 0 (random relationship) to 1 (perfect
linear relationship).

Techniques Used for


Implementation

Spatial
Domain

DC

Frequency
Domain

FFT

DW
T
Combined DCT-DWT
Combined DCT-SVD

SV
D

Fuzzy Logic
Techniques

Combinatio
n of one or
more
frequency
domain

Fuzzy
Interferenc
e System

Combination
of all
Neural Network
Techniques
Techniques

Combined one or
two frequency
domain & Fuzzy
Interference
System

Genetic
Algorithm
NeuroAdaptive
Fuzzy
Neuro Fuzzy
Networ
Interference
k System

Combined DCT-FFT
Combined DWT-SVD
Combined DCT-DWTSVD
Combined DCT-DWTFFT-SVD

Combination of one or
more frequency domain
techniques and fuzzy
interference system and
dynamic neural network

Combination of
Spatial Domain
Technique and
Adaptive neuro
fuzzy interference
system

Figure1: Different types of techniques used for implementation for Image


Processing.

Enhancement Techniques

Spatial Domain Approaches

Point Processing

Image Subtraction

Low Pass Filtering

Frequency Domain Approaches

Image Averaging

Median Filtering

Spatial Filtering

Pseudo
Colour
Low
Pass
Homomorphic
High Pass
Image
Processing
Filter Filter
Filter

High Pass Filtering

Figure 2: Different types of Enhancement


techniques used for implementation for Image Processing.
Contrast
Stretching

Gray Level
Slicing

Bit
Plane
Slicing

Histogram
Processing

Histogram Equalization

Image
Enhancement

Protocol
Attack

Interferenc
e Attack

Cryptographic
Attacks

Active

Passive

Different Types of Attacks on Images


Histogram Specification

Removal
Attack

Image
Compression

Image
Compression
using DWT

Cropping
Geometric
Image
Collusion
Attack
Attack
Degradation
Attack
Forgery
Low pass filtering
Rotation
Image
Attack
Attack
Attack
Transformation

Image
Compressio
n using DCT

Figure 3: Different Types of Attacks on Images

Implementation:Implementation of any software using above techniques from fig.1 is


always preceded by important decisions regarding selection of the platform, the language
used, etc. these decisions are often influenced by several factors such as real environment in
which the system works, the speed that is required, the security concerns, and other
implementation specific details. There are three major implementation decisions that have
been made before the implementation all above techniques of this research.
They are as follows:
Selection of the platform (Operating System).
Selection of the programming language for development of the
application.
Coding and software development life cycle guideline to be followed.

Implementation Requirements: Implementation requirements are classified into


two main parts i.e. software requirement and hardware requirement as shown in following
Implementation Requirements
figure.

Hardware Requirements

Software Requirements

250 GB Hard
Disk.

Intel
Core
i3330MProcessor 2.13GHZ
or More
RAM more than 1GB.

Operating
System
The Software
chosenused:
Microsoft
for thisWindows
project XP
is (32
bit MATLAB
and 64 bit)
or Window-7
(R2010a).
or Window-8

You might also like