You are on page 1of 15

Performance Comparative Analysis of Multiple Techniques used for

Encryption & Digital Watermarking.


1.Introduction
Watermarking is a technique used to hide data or identifying information within digital
multimedia. Our discussion will focus primarily on the watermarking of digital images, though
digital video, audio, and documents are also routinely watermarked. Digital watermarking is
becoming popular, especially for adding undetectable identifying marks, such as author or
copyright information. The digital watermarking process embeds a signal into the media without
significantly degrading its visual quality. Digital watermarking is a process to embed some
information called watermark into different kinds of media called Cover Work [10,2].
Digital watermarking is used to hide the information inside a signal, which cannot be
easily extracted by the third party. Its widely used application is copyright protection of digital
information. It is different from the encryption in the sense that it allows the user to access, view
and interpret the signal but protect the ownership of the content. Digital watermarking involves
embedding a structure in a host signal to mark its ownership [12]. Digital watermarks are
inside the information so that ownership of the information cannot be claimed by third party [8].
While some watermarks are visible [5], most watermarks are invisible.Two important
requirements in watermarking are perceptual transparency and robustness [1]. Transparency
means that watermark should neither be noticeable to the viewer nor should introduce a
significant degree of distortion in the host image. Robustness refers to the ability of watermark to
resist intentional or unintentional image modifications such as filtering, geometric
transformations, noise addition, etc. [2].
The large number of digital multimedia data transmitted over internet through various
applications which requires more security and authenticity due to rapid growth of multimedia
and internet technology. The rapid expansion of the Internet and digital technologies in the past
years has sharply increased the ease of the production and distribution of digital media[3]. The
main idea of steganography is the embedding of secret information into data under the
assumption that others cannot know the secret information in data. The main idea of watermarks
is to check the logo embedded in data or not [4]. In this, the data hiding process is more
important. Data hiding shows processes used to embed data, such as copyright information,

various companies important documents etc. transfer over internet link and convert into various
forms of media such as image, audio, or text with a minimum amount of perceivable degradation
to the host signal; so that embedded data should be invisible and inaudible to a human
observer, So that data can be prevent. Its goal is not to restrictor regulate access to the host
signal, but rather to ensure that embedded data remain inviolate and recoverable. Data hiding in
audio signals is especially challenging, because the human auditory system (HAS) operates over
a wide dynamic range. The HAS perceives over a range of power greater than one billion to one
and a range of frequencies greater than one thousand to one [5]. Based on the type of document
to be watermarked Text Watermarking: Line shift coding, word shift coding, feature codingand
internet technology. The rapid expansion of the Internet and digital technologies in the past years
has sharply increased the ease of the production and distribution of digital media[3]. The main
idea of steganography is the embedding of secret information into data under the assumption that
others cannot know the secret information in data.
The main idea of watermarks is to check the logo embedded in data or not [4]. In this, the
data hiding process is more important. Data hiding shows processes used to embed data, such as
copyright information, various companies important documents etc. transfer over internet link
and convert into various forms of media such as image, audio, or text with a minimum amount of
perceivable degradation to the host signal; so that embedded data should be invisible and
inaudible to a human observer, So that data can be prevent. Its goal is not to restrictor regulate
access to the host signal, but rather to ensure that embedded data remain inviolate and
recoverable and internet technology. The rapid expansion of the Internet and digital technologies
in the past years has sharply increased the ease of the production and distribution of digital
media[3]. The main idea of steganography is the embedding of secret information into data under
the assumption that others cannot know the secret information in data. The main idea of
watermarks is to check the logo embedded in data or not [4].
In this, the data hiding process is more important. Data hiding shows processes used to
embed data, such as copyright information, various companies important documents etc. transfer
over internet link and convert into various forms of media such as image, audio, or text with a
minimum amount of perceivable degradation to the host signal; so that embedded data should
be invisible and inaudible to a human observer, So that data can be prevent. Its goal is not to
restrictor regulate access to the host signal, but rather to ensure that embedded data remain

inviolate and recoverable. and internet technology. The rapid expansion of the Internet and
digital technologies in the past years has sharply increased the ease of the production and
distribution of digital media[3]. The main idea of steganography is the embedding of secret
information into data under the assumption that others cannot know the secret information in
data. The main idea of watermarks is to check the logo embedded in data or not [4]. In this, the
data hiding process is more important. Data hiding shows processes used to embed data, such as
copyright information, various companies important documents etc. transfer over internet link
and convert into various forms of media such as image, audio, or text with a minimum amount of
perceivable degradation to the host signal; so that embedded data should be invisible and
inaudible to a human observer, So that data can be prevent. Its goal is not to restrictor regulate
access to the host signal, but rather to ensure that embedded data remain inviolate and
recoverable. and internet technology. The rapid expansion of the Internet and digital technologies
in the past years has sharply increased the ease of the production and distribution of digital
media[3].
The main idea of steganography is the embedding of secret information into data under
the assumption that others cannot know the secret information in data. The main idea of
watermarks is to check the logo embedded in data or not [4]. In this, the data hiding process is
more important. Data hiding shows processes used to embed data, such as copyright information,
and internet technology. The rapid expansion of the Internet and digital technologies in the past
years has sharply increased the ease of the production and distribution of digital media[3]. The
main idea of steganography is the embedding of secret information into data under the
assumption that others cannot know the secret information in data. The main idea of watermarks
is to check the logo embedded in data or not [4]. In this, the data hiding process is more
important. Data hiding shows processes used to embed data, such as copyright information,
various companies important documents etc. transfer over internet link and convert into various
forms of media such as image, audio, or text with a minimum amount of perceivable degradation
to the host signal; so that embedded data should be invisible and inaudible to a human
observer, So that data can be prevent. Its goal is not to restrictor regulate access to the host
signal, but rather to ensure that embedded data remain inviolate and recoverable.

and internet technology. The rapid expansion of the Internet and digital technologies in the past
years has sharply increased the ease of the production and distribution of digital media[3]. The
main idea of steganography is the embedding of secret information into data under the
assumption that others cannot know the secret information in data. The main idea of watermarks
is to check the logo embedded in data or not [4]. In this, the data hiding process is more
important. Data hiding shows processes used to embed data, such as copyright information,
various companies important documents etc. transfer over internet link and convert into various
forms of media such as image, audio, or text with a minimum amount of perceivable degradation
to the host signal; so that embedded data should be invisible and inaudible to a human
observer, So that data can be prevent. Its goal is not to restrictor regulate access to the host
signal, but rather to ensure that embedded data remain inviolate and recoverable.
Data hiding in audio signals is especially challenging, because the human auditory
system (HAS) operates over a wide dynamic range. The HAS perceives over a range of power
greater than one billion to one and a range of frequencies greater than one thousand to one [5].
Based on the type of document to be watermarked Text Watermarking: Line shift coding, word
shift coding, feature coding. Visible Watermark: The information is visible in the picture or
video. Typically, the information is text or a logo which identifies the owner of the media.
Invisible Watermark: An invisible watermark is an overlaid image which cannot be se en, but
which can be detected algorithmically. Dual Watermarking: Dual watermark is a combination of
a visible and an invisible watermark. In this type of watermark, an invisible watermark is used as
a backup for the visible watermark [4]. Another classification of watermarking system is based
on the domain in which the watermark is embedded. If watermark is embedded by modifying the
intensity value of the pixels then it is called spatial domain watermarking, if the frequency
coefficients are changed then it is called transform domain watermarking system. Many
transformation techniques are used for transforming image from spatial to frequency domain
which includes Discrete Fourier Transform (DFT), discrete cosine Transform (DCT), Discrete
wavelets transform (DWT) and Discrete Hadamard Transformation (DHT) [7].QR Code is a type
of 2-D (two-dimensional) Symbology.
2. TYPES OF DIGITAL WATERMARKS:Watermarks and watermarking techniques can be divided into various categories in various
ways.

According to the type of document to be watermarked, watermarking techniques can be


divided into four categories as follows:
i. Text Watermarking
ii. Image Watermarking
iii. Audio Watermarking
iv. Video Watermarking
In other way, the digital watermarks can be divided into three different types as follows:
i. Visible watermark: Visible watermark is a secondary translucent overlaid into the
primary image.
ii. Invisible-Robust watermark: The invisible-robust watermark is embed in such a
way that alternations made to the pixel value is perceptually not noticed and it can be recovered
only with appropriate decoding mechanism.
iii. Invisible-Fragile watermark: The invisible-fragile watermark is embedded in
such a way that any modification of the image would alter or destroy the watermark.
A robust watermark should survive a wide variety of attacks both incidental and malicious
[4, 5]. These watermark attacks can be Simple, Detection-disabling, Ambiguity and Removal
attacks. Incidental attacks are those which is applied with a purpose other than to destroy the
watermark.
3. Literature Survey :In the literature survey, many technique uses the SVD-DWT based embedding for gray
scale mage watermarking. The color image is represented by Red (R), Green (G) and Blue (B)
channels. Out of these three channels, change in the intensity of R channel is the most sensitive
to human eyes whereas for B channel it is least sensitive. Watermarking is a pattern of bits
inserted into digital image, audio, video or text file that identifies the files copyright information
such as author and rights [3]. Thus, watermarking is an approach to make sure the data are
protected. Watermarking is designed to be completely invisible. Once the watermarking is done,
user can send the watermarked image to other computer so that other user is able to read the
watermark or the hidden message in the image only if the same algorithm is used. Thus, the
watermark can be protected without being revealed. It may also be necessary to keep the
existence of the message secret. The technique used to implement this, is called steganography.
Steganography literally means, "covered writing". An ideal steganographic system would embed

a large amount of information, perfectly securely with no visible degradation to the cover object.
Steganographic methods are in general not robust, that is the hidden information cannot be
recovered after data manipulation.
Watermarking is robust against attacks. If the existence of the hidden information is known it
is difficult, ideally impossible for an attacker to destroy the embedded watermark
.Imperceptibility, robustness, inseparability, security, are the features of digital watermarking.
The image watermarking techniques can be classified into two categories:
3.1 Spatial-domain techniques (spatial watermarks):-

The spatial-domain techniques directly modify the intensities or color values of some
selected pixels. No transforms are applied to the host signal during watermark embedding.
Spatial techniques are not very robust against attacks. The main strengths of pixel domain
methods are that they are conceptually simple and have very low computational complexities.
spatial domain technique, is less time consuming as compare to wavelet or frequency domain
techniques.
3.2 Least Significant Bit (LSB) Technique:The simplest spatial-domain image watermarking technique is to embed a watermark in
the least significant bits (LSBs) of some randomly selected pixels of the cover image.
Example of least significant bit watermarking Image:
10001010 01110100 00011011 01000001 ...
Watermark:
0 1 1 0 ...
Watermarked Image:
10001010 01110101 00011011 01000000 ...
with their features and results is shown in Table 1.

Different techniques of digital image watermarking, based on spatial and frequency


domain techniques have been discussed. On the basis of above survey it is clear that spatial
domain is most widely used technique because the watermark can successfully & easily be
recovered if the image has been cropped or translated. As compared to frequency domain.
On the other hand frequency domain provides more security but at the same time recovery of
watermark at the receiver end is more difficult because the complexity increases.Successful
recovery of watermark cannot be provided by the frequency domain techniques. Literature
survey shows that the watermark may be of visible or invisible type and each method has its own
strengths and weaknesses.The quality of watermarked images is measured in terms of PSNR
(Peak Signal to Noise Ratio) and MSE (Mean Square Error). In ideal case the value of
PSNR & MSE should be infinite and zero respectively . But it is not possible for watermarked
image. So, large PSNR and small MSE is desirable.

To provide the security & copyright protection for digital images, it is proposed to study of
security & copyright protection technique like Digital Watermarking .
Types of imags: Medical Image.
Indoor Image.
Outdoor Image.
Satellite Image

Methods used for Implementing Digital Watermarking Techniques


Frequency Domain Method.
Spatial Domain Method.
Neural Network Method.
Fuzzy Logic Domain Method.
Genetic Algorithm Method.

Objectives of Research

Combination of Multiple Techniques Used For Combined Encryption And Digital Watermarking
is to be studied.
To calculate the peak signal to noise ratio of watermarked image & compare it with covered
image.
To calculate the elapsed time during watermark for insertion and extraction process.
To calculate the imperceptibility and robustness of watermark image & compare with cover
image.
To calculate the robustness & good capacity of image again various attack such as cropping,
compression , rotation, etc.
After calculating the peak signal to noise ratio, impercepbility ,robustness & good capacity by
using various schemes of digital watermarking Techniques and comparing their results to see
which is the best scheme that can be used for security of digitaison

Comparative study:
Fctors
Robustness
Imprcptibility
Security
unambiguous

Simple watermarking
Less robust
Quality may not be restained
Less scure
More ambigious

Implementation Decision:a. Selection of platform(O.S)


b. Selection of the programming language, tools.
c. Coding guideline to be followed.

Two types of Implementation requirements:A. Software Requirement.


B. Hardware Requirement.

Software Requirement.
1)The Software chosen for this research is Matlab (R2010a).

Multiple watermrking
More robust
Assurance of no loss
More secure
Less ambigu

2)Operating System used: Microsoft Window xp (32 bit and 64 bit)


Or

Window-7.
Hardware Requirement

Intel core i3-330 Microprocessor 2.13GHZ.


250 GB Hard Disk.
RAM more than 1 GB.
Key References
[1]Robust Digital Image Watermarking Scheme with Neural Network and Fuzzy Logic
Approach.by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Emerging
Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2,
Issue 9, September 2012).

[2] A robust and secure watermarking scheme basedon singular values replacement byAKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sadhana Vol. 37, Part 4, August 2012,
pp. 425440._c Indian Academy of Sciences.

[3] The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in
DWT Domain. by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Computer
Science and Network (IJCSN) Volume 1, Issue 5, June 2012 www.ijcsn.org ISSN 2277-5420.

[4] A Survey of Digital Watermarking Techniques for Multimedia Data.byFarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and
Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).
[5] Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent
Technique.By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew ,
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION
Issue 1, Volume 6, 2012.

[6]ADAPTATIVE IMAGEWATERMARKING SCHEME BASED ONNEURAL


NETWORK,by- SAMEH OUESLATI, ADNENE CHERIF and BASSEL SOLAIMANE,
SamehOueslati et al. / International Journal of Engineering Science and Technology (IJEST),
ISSN : 0975-5462 Vol. 3 No. 1 Jan 2011.

[7] ROBUST IMAGE ADAPTIVE WATERMARKING USING FUZZYLOGIC AN FPGA


APPROACH.by-PankajU.Lande Sanjay N. Talbar G.N. Shinde, International Journal of Signal
Processing, Image Processing and Pattern RecognitionVol. 3, No. 4, December, 2010.

[8] Performance Analysis of Digital Image Watermarking TechniqueCombined DWT


DCT over individual DWT.By-A.M.Kothari, A.C.Suthar and R.S.Gajre, Published in
International Journal of Advanced Engineering & Applications, Jan. 2010.
[9] Comparison of Digital Water Marking methods.by-DarshanaMistry / (IJCSE) International
Journal on Computer Science and EngineeringVol. 02, No. 09, 2010, 2905-2909.

[10] A FUZZY LOGIC APPROACH TO ENCRYPTEDWATERMARKING FOR STILL


IMAGES IN WAVELETDOMAIN ON FPGAby-PankajU.Lande Sanjay N. Talbar and G.N.
ShindeInternational Journal of Signal Processing, Image Processing and Pattern RecognitionVol.
3, No. 2, June, 2010.

[11] Robust Secure SVD Based DCT DWT Oriented Watermarking Technique for Image
Authentication. S SBedi, Ashwani Kumar, and PiyushKapoor, International Conference on IT to
Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.

[12] Robust Digital Image Watermarking Based on Joint DWT-DCT.By-Saeed K.


Amirgholipour, Ahmad R. Naghsh-Nilchi, International Journal of Digital Content Technology
and its Applications Volume 3, Number 2, June 2009.
[13] A Digital Watermarking Algorithm Based On DCT and DWT by- Mei Jiansheng, Li
Sukang and Tan Xiaomei, ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)
Proceedings of the 2009 International Symposium on Web Information Systems and Applications
(WISA09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.

[14] Watermarking Algorithm Research andImplementation Based on DCT Block. byGengming Zhu, and Nong Sang, World Academy of Science, Engineering and Technology 45,
2008.

[15]Rafael C. Gonzalez and Richard Eugene Woods, Digital image processing Prentice Hall,
2008.

[16] Combined DWT-DCT Digital Image Watermarking. by-Ali Al-Haj, Journal of Computer
Science 3 (9): 740-746, 2007 ISSN 1549-3636 2007 Science Publications.

[17]A Blind DCT Domain Digital Watermarking by-SaeidSaryazdi,


MehrnazDemehriDepartement of Electrical Engineering, University of Kerman, Kerman, Iran,
SETIT2005.

[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using
Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics,
pp: 5308-5313,China.

[19] Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies. byEmir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 2021, 2004, Magdeburg,
Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.

[20]. Voloshynovskiy, S., S. Pereira and T. Pun, 2001."Attacks on DigitalWatermarks:


Classification,Estimation-Based Attacks, and Benchmarks,"Comm. Magazine, 39(8): 118-126.

[21]. Ejima, M. and A. Myazaki, 2001." On theevaluation of performance of digital


watermarkingin the frequency domain," in Proc. of the IEEEInt. Conf. on Image Processing, 2:
546-549.

[22] Color Image Watermarking based on the DCT-Domain ofThree RGB ColorChannels.By-I.
El-Fegh, D. Mustafa, ZakariaSulimanZubi, Faraj A. El-Mouadib., Proceedings of the 10th
WSEAS International Conference on EVOLUTIONARY COMPUTING, ISSN: 1790-5109
ISBN: 978-960-474-067-3.

You might also like