Professional Documents
Culture Documents
AbstractDigital watermarking is a process to provide authenticity by hiding a data into an image or audio or document.
Hiding of data in an image can be done in frequency domain.
Since frequency domain based techniques are more robust against
signal processing and geometric attacks than time domain based
techniques and watermark can also be extracted with(non blind)
and without(blind) original cover image. In this paper we
proposed a blind image watermarking technique which embeds
watermark into image in frequency domain using discrete wavelet
transform, singular value decomposition and torus automorphism
techniques. This technique extracts watermark without cover
image and also proved that this method is robust against different
signal and non signal processing attacks.
I NTRODUCTION
58
2014 IEEE 10th International Colloquium on Signal Processing & its Applications (CSPA2014), 7 - 9 Mac. 2014, Kuala Lumpur, Malaysia
Fig. 1.
Analysis of 2D DWT
Fig. 2.
Synthesis of 2D DWT
Fig. 3.
C. Torus Automorphism
In this method, we insert each watermark bit into SVD of
one block of LL band of host image, before inserting the
watermark, the binary watermark is spatially dispersed using
a chaotic system called torus automorphism. Due this we can
avoid burst errors. Torus automorphism is a kind of dynamic
system. Briefly speaking, a dynamic system is a system whose
states change with time t. When t is discrete, a dynamic system
can be presented as an iteration of a function f, i.e., St+1 =
f(St ),t Z = 0, 1, 2, . . ., St , St+1 are the states at time t
and t +1, respectively. A two-dimensional Torus automorphism
can be considered as a permutation function or a spatial
transformation of a plane region. This transformation can be
performed using a 2x2 matrix A with constant elements[12].
The automorphism produces same image after few iterations.
So this automorphism is periodic in nature. The figure 4
shows the example of torus automorphism on watermark and
watermark images shown from left to right from t=0 to t=5.
(1)
III.
59
2014 IEEE 10th International Colloquium on Signal Processing & its Applications (CSPA2014), 7 - 9 Mac. 2014, Kuala Lumpur, Malaysia
Fig. 4.
Fig. 6.
Fig. 5.
B. Watermark Extraction
Where, watermark extraction method is a blind that means
it does not require original cover image while extracting
watermark. So, if we have watermarked image that is enough to
extract watermark. First, one level 2D DWT is computed on
watermarked image and LL band of watermarked imagewill
be divided into sub-blocks of size 8x8 and then block wise
svd will be performed. We extracts watermark based on
given equation and compared against threshold value to know
whether the final result is zero or one. This result is re-arranged
as matrix and then torus automorphism will be performed to
get original logo. The steps involved int watermark extraction
5 to 6 is given below
A. Watermark Embedding
Watermark is the customer related information in the form of
binary data. Binary data can be either logo or bits representing
customer ID. In this work we considered logo as a customer
information. First, 2D logo will be converted into bits consists
of zeros and ones and then resultant will be scrambled using
torus automorphism upto five times, so that resultant data will
be sparse in plane and this causes in reduction of burst errors
and provides watermark security. The resultant data will be
converted into bipolar form and re arranged as a 1D signal.
This data acts as watermark that is going to be embed in the
image. On the other hand one level 2D DWT will be applied
on input image, in which watermark to be embedded. Then
we select LL band as a host data, to embed watermark to
it. LL band will be subdivided into blocks of size 8x8 and
then SVD will be applied to each of the blocks. This results
in a three matrices U*S*V. We embed one watermark bit to
one individual block that too to largest eigen value and then
inverse SVD will be performed. Uniqueness of our technique
is that, we embed one watermark bit to one individual block in
SVD domain. So that this bit distributes over 64 pixels, even
though we loss some data, we will be able to extract that bit.
The embedded equations 2 to 4 is given below.
[Um Sm Vm ] = SV D(Iwmblock )
0,
Sm (3, 3) 1 > Sm (2, 2)
wmbit =
1,
else
(2)
(3)
Iwmblock = U m V T
(4)
(6)
[U S V ] = SV D(Iblock )
(5)
S.No
1
2
3
4
5
60
BER
Attack Type
JPEG compression(lossy)
Resize(120%)
Resize(50%)
Gaussian filtering
TABLE
2014 IEEE 10th International Colloquium on Signal Processing & its Applications (CSPA2014), 7 - 9 Mac. 2014, Kuala Lumpur, Malaysia
[2]
[3]
[4]
Fig. 7. Extracted logo without scrambling with scrambling for the rotation
attack, images shown from left to right.
[5]
[6]
[7]
Fig. 8. a) input logo, b)extracted logo under scrambling, c)dilation on b,
d)erosion on c. image number given from left to right.
[8]
[9]
[10]
[11]
[12]
C ONCLUSION
61
Bors and I. Pitas, Image wate rmarking using DCT domain constraints.
in Proc. IEEE. Int. Conf. Image Processing , Lausanne, Switzerland,
Sept. 1996, pp. 231-234.
Cox, IJ, Miller, ML Bloom, JA 2002, Digital Watermarking,Morgan
Kaufmann Publisher, San Francisco, CA, USA.
Fangjun Huang, Zhi-Hong Guan, A hybrid SVD-DCT watermarking
method based on LPSNR, Pattern Recognition Letters 25 (2004)
17691775.
W. H. Bin, Y. H. Liang, W. C. Dong, W. S. Ming: A New Watermarking
Algorithm Based on DCT and DWT Fusion, International Conference
on Electrical and Control Engineering, pp. 2614 - 2617, 2010.
A. Al-Haj: Combined DWT-DCT digital image watermarking, Journal
of Computer Science 3 (9): pp. 740- 746, 2007.
Emir Ganic , Ahmet M. Eskicioglu,Robust DWT-SVD domain image
watermarking: embedding data in all frequencies, ACM Multimedia and
Security Workshop 2004.
V.Santhi and Dr. Arunkumar Thangavelu, DWT-SVD Combined Full
Band Robust Watermarking Technique for Color Images in YUV Color
Space, International Journal of Computer Theory and Engineering, Vol.
1, No. 4, October2009 1793-8201.
Ms.Kapre Bhagyashri S, Mrs. Joshi M.Y, Robust Image Watermarking
based on Singular Value Decomposition and Discrete Wavelet Transform,3rd IEEE International Conference on Computer Science and
Information Technology (ICCSIT), 2010, Pages 337 341.
Musawir Ali, An introduction to wavelets and haar transform, Available:
http://www.cs.ucf.edu/ mali/haar/
Krishna Rao K, Srinivasa Rao Ch, Digital Audio Watermarking
Using DWT-SVD and Secret Sharing, International Journal of Signal
Processing Systems, Vol. 1, No. 1, pp. 59-62, June 2013
P. L. Lin, C.K. Hsieh and P.W. Hua ng, A hierarchical digital watermarki ng method for image tamper detection and recovery, Pattern
Recognition, vol. 38, no. 4, pp. 2519-2529, 2005