Professional Documents
Culture Documents
Abstract: The Sudden increase in the internet applications has which can make the watermarking process robust. In the
lead people into digital world. Digital watermarking facilitates e- recent times wavelet based digital watermarking has
client distribution, reproduction and manipulation over become, a very active research area. Watermarking
networked information systems for image, audio clips, and approaches are classified into two categories: Spatial
videos. To address this, the present paper proposes a digital domain and Transform domain methods. Transform domain
image watermarking technique based on various preprocessing watermarking techniques are more robust in comparison to
methods. The watermark is inserted on the selected pixels based
spatial domain methods. Among the transform domain
on some preprocessing methods applied on a L-level wavelet
transformed image. The Level L has been chosen based on the watermarking techniques, Discrete Wavelet Transform
size of the watermark and window. To test the robustness of the (DWT) based watermarking techniques are gaining more
proposed method, various peak signal noise ratios are applied. popularity because of their superior modeling of Human
The experimental result indicates imperceptibility, security, Visual System [2]. To achieve copyright protection, a
unambiguity and robustness of the present method. watermarking scheme for digital images must have the
Keywords: Wavelet Transformation, Preprocessing, Peak following properties: (1) Imperceptibility or
Signal Noise Ratio. low degree obtrusiveness: it should be extremely difficult to
distinguish between the host image and the watermarked
1. Introduction image. The quality of the image should not be compromised.
The great advancement taken place in the field of Internet (2) Security: a watermark should be statistically
has facilitated the transmission, wide distribution, and undetectable. The watermarking algorithm must be public,
access of multimedia data in an effortless manner. The use with security depending only on keeping the key secret [11,
of digitally formatted image and video information is 12, 15]. Only the owner of the host image should be able to
rapidly increasing along with the development of extract or remove the embedded watermark. (3) Fast
multimedia broadcasting, network databases and electronic embedding / retrieval: The speed of a watermark embedding
publishing [3, 4, 5, 6, 19]. All these developments are algorithm is important for applications where documents are
proceeding with a serious drawback: if the media data is marked ‘on the fly’ (4) No reference to original document:
copyrighted, the unlimited copying of media data may cause For some applications, it is necessary to recover the
considerable financial loss, the protection of intellectual watermark without requiring the original, unmarked
property rights has become an important issue in the document (which would otherwise be stored in a secure
network-centric world. One effective solution to the archive). (5) Multiple watermarks: It may also be desirable
unauthorized distribution problem is the embedded of digital to embed multiple watermarks in a document. For example,
watermarks into multimedia data [10]. New progress in an image might be marked with a unique watermark each
digital technologies, such as compression techniques, has time when it is downloaded [8]. (6) Robustness: when the
brought new challenges in to watermarking. Various quality of the host image is degraded by attacks such as
watermarking schemes that can employ different techniques blurring, sharpening, scaling, cropping, noising, or JPEG
have been proposed over the last few years [1, 7, 9, 10, 13- compression, it should still be possible to retrieve and
19]. To be effective, a watermark must be imperceptible identify embedded watermark. The watermark must be
within its host, easily extracted by the owner, and robust to retrievable if common image processing or geometric
intentional and unintentional distortions [2]. In specific, distortions are performed. (7) Unambiguity: the retrieved
DWT has wide applications in the area of image watermark should clearly verify the copyright owner of the
authentication. This is because it has many specifications image. In addition, ideal watermarking schemes should also
(IJCNS) International Journal of Computer and Network Security, 31
Vol. 1, No. 2, November 2009
be able to solve the problem of multiple claims of the help of a flow chart given in figure 2. Based on the
ownership. flowchart a block diagram for lena image is given in figure
The rest of this paper is organized as follows: In Section 2, 3. The block diagram of figure 3 clearly indicates the
the wavelet transformation of images is discussed in detail. process of inserting the watermark text in lena image after
The proposed method along with various pre-processing three levels of wavelet transform on LL sub image. The
methods is explained in Section 3. In Section 4, the watermark can be inserted on any LL, LH, HL or HH sub
performance of the proposed method is analyzed. Finally, 5th bands. The same process can be applied on any wavelet
section deals with conclusions. transform.
N ++COUNT
79 86 74 96 81 76
74 75 82 86 84 82
76 75 79 84 82 79
76 79 81 83 80 76
78 77 74 72 70 74
82 80 76 79 78 80
z −1 z −1
Figure 5. Hit pixels of the original image of figure 4
Median = middlevalue ASC ∀ ∀ P (i , j )
i=0 j =0 ..…(2)
4. Experimental Result and Analysis
For the experimental analysis different images of size
z −1 z −1
Mode = mod value ∀ ∀ P(i, j ) …....….….(3) 64x64 are selected and the proposed method is applied. The
i =0 j =0 cover images considered in the present paper are brain
image, lena image, barbara image, camera man image, and
baboon image which are shown from figure 6(a) to 6(e)
z −1 z −1 z −1 z −1
∑∑ P (i, j ) ∑∑ ( P (i, j )) 2 … .(4) respectively. The figure 7(a) to 7(e) shows 3-level wavelet
i=0 j =0 i =0 j = 0 compressed image. The figure 8(a) to 8(e) shows the wavelet
Variance = int −
z z decomposed image with the watermark text “MGRU”
embedded. The figure 9(a) to 9(e) shows the reconstructed
watermarked image
1/ 2
z −1 z −1 z −1 z −1
To measure the quality of watermarked images, the peek
∑∑ P (i , j ) ∑∑ ( P (i , j )) 2 signal-to-noise ratio (PSNR) is used. Which is given in the
SD = i =0 j =0 − i =0 j =0 ……….(5)
equation (6)
z z …(6)
PSNR ( C , W ' ) = 10 log
255 2 xMxN
∑ ∑
M
i =1
N
j =1
[f ( x i y j ) − f '( xi y j ) ]2
where P(i,j) represents the gray level value at the location
i,j of the window, z is no. of pixels in the block. where C is the cover image and W` is the watermarked
image, with dimensions N X M. The PSNR is applied for all
The figure 4 shows the grey level image of size 6 x 6. cover images of figure 6(a) to 6(e) and watermarked images
Whereas figure 5 shows the hit pixel of figure 4, which are at figure 9(a) to figure 9(e) and the results are tabulated in
marked with circles based on the mean preprocessing table 1. The table 1 clearly indicates that PSNR values for
method. all the proposed preprocessing methods. From the table 1 it
is clearly evident that all the proposed preprocessing
methods are showing above 50db, which indicates the high
robustness.
(IJCNS) International Journal of Computer and Network Security, 33
Vol. 1, No. 2, November 2009
Table 1: Five different reconstructed images expressed in The reconstructed watermarked images of figure 9(a) to
PSNR (db) for different methods 9(e) clearly indicate the clarity, imperceptibility, robustness
of the image when compared to figure 6(a) to 6(e).
5. Conclusion
The PSNR values clearly indicate that high robustness of
the proposed method. The proposed preprocessing
techniques can be extended on any window size and the
(a) (b) (c) watermark content may also be increased from minimum of
two characters to maximum of any length depending on the
size of the image. The advantage of preprocessing methods
for selecting the hit pixel over the other methods on wavelet
image is of maintaining the important the characteristics of
the image without any loss of image content or the
information in the selected region.
(d) (e)
Figure 6. The cover images a) Brain Image b) Lena Image Appendix A: Processing Methods
c)Barbara Image d) Cameraman Image e) Baboon Image
Images Brain Lena Barbara Camera Baboon
Used Pre Image Image Image Man Image Image
Processing
Methods
54.1
53.88 56.19 53.4 52.76
Mean 5
(a) (b) (c) (d) (e)
Figure 7. Compressed cover image a) Brain Image b) Lena 53.1
53.40 55.05 53.88 52.97
Image c)Barbara Image d) Cameraman Image e) Baboon Median 8
Image
53.8
53.40 54.15 53.88 55.05
Mode 8
55.4
54.43 53.88 53.40 55.40
Variance 0
References
[1] Aboofazeli. M, G. Thomas and Z. Moussavi,
“A wavelet transform based digital image
watermarking scheme,” in Proc. IEEE CCECE, vol.
(d) (e) 2, pp. 823 – 826, May 2004.
[2] Adhipathi Reddy A , B.N. Chatterji “A new wavelet
based logo-watermarking scheme”, Pattern
Figure9. Reconstructed watermarked image a) Brain Image Recognition Letters 26 (2005) 1019–1027
b) Lena Image c)Barbara Image d) Cameraman Image [3] Andreja Samcovic , Jan Turan, “ Attacks on Digital
e) Baboon Image Image Wavelet Image Watermarks”, Journal of
.
34 (IJCNS) International Journal of Computer and Network Security,
Vol. 1, No. 2, November 2009