Beruflich Dokumente
Kultur Dokumente
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 1, January February 2013 ISSN 2278-6856
Robust Reversible Watermarking For Geometric Attack by Proposed Pixel Replacement Method
Dr.Rajendra D.Kanphade1 and Mr.Navnath S. Narawade2
Member IEEE and Professor in Dept of E&TC Engg, Nutan Maharashtra Institute Of Technology And Engineering, Talegaon(D), Pune, India. Research Scholar, Dept of Electronics Engg. Sant Gadgebaba Amravati University, Amravati. Amravati, India Abstract: Reversible watermarking is broadly used in
military and medical applications. In this paper we are presenting a novel pixel replacement method, whose watermark is robust to geometric attack as well as it has maximum embedding capacity than all histogram shifting methods. This idea is generated from histogram shifting method, a well known method for reversible watermarking. Our method also maintains comparable quality of watermarked images. Other techniques affected with geometric attacks such as rotation, scaling and translation are not robust watermarking techniques. They do not recover 100% similar watermark and image with original. Our few modifications proved that our method is robust watermarking method with 100% similarity between original and recovered watermark. In our method, PSNR is slightly reduced than histogram shifting method, (minimum 48 dB) but still it is higher than Dinu Coltucs RCM method and Tians Difference expansion method. The embedding capacity of our method is more than histogram shifting method but it is lesser than RCM and difference expansion method. By compromising quality of watermarked image, embedding capacity can be improved more than difference expansion, RCM and histogram shifting method. Our proposed replacement method is less complex than difference expansion and RCM method. So optimizing quality and embedding capacity, this method can be made superior. This method gets a crown in her head, as we have made it robust watermarking for geometric attack by combining with existing Geometric Transformation Correction method.
2 1
Keywords- Reversible Watermarking, histogram shifting, embedding capacity, processing time, PSNR, robust and geometric attack.
1. INTRODUCTION
Jun Tian[1] have introduced reversible watermarking using two techniques, difference expansion and generalized least significant bit embedding, to achieve very good embedding capacity. Alattar derived a Volume 2, Issue 1 January - February 2013
difference expansion transform for triplets and extended Tians algorithm to embed two bits in every triplet of pixels. Dinu Coltuc [2] developed a simple and efficient reversible hiding scheme based on reversible contrast mapping (RCM), which does not need location maps to recover the host image. However, their scheme can not fully control the position where information is embedded, so the quality of the stego image is poor. Tzu-Chuen Lu et. al. removed these drawback and presented new form of RCM in 2008. Histogram shifting method is one of the best method of reversible watermarking. Wien Hong [3] have modified this method and introduced fast method. Histogram shifting technique presented by Ni. Et. Al.[4] have disadvantage that it has more complexity due to image is scanned three times. A modified histogram shifting is presented by Wien Hong, Tung Shou Chen, Kai yung Lin, Wen Chin Chiang(2010)[3], who reduced complexity and improved quality of image. He presented a restricted payload by the distribution of pixel values. In general as an image histogram with greater peak height, the image should have a greater payload. This drawback has been reduced by Mr. Navnath Narawade[5-6] and Dr. Rajendra Kanphade . They have presented improved embedding capacity reversible watermarking than Hongs modified histogram shifting method. They have improved embedding capacity as well. But nobody have thought about robust watermarking for geometric attack. We here present a robust reversible watermarking technique for geometric attack. Watermarking techniques with maximum 90% similarity between original and recovered watermark as well as maximum 90% similarity between original and recovered image is a reality till today. The techniques in the reversible watermarking can roughly be categorized into five types[7], namely Difference expansion[1], Histogram shifting[3], Contrast Mapping[2], Integer Wavelet Transform[8],modulo 256 addition [9], lossless multi resolution transform [10], Page 186
2. PROPOSED METHOD
Embedding: Input: Original 8 bit grayscale image I, with MxN pixels and watermark Iw. Output: Watermarked image Iw, and key with the peak point a, and its locations alongwith length of watermark. Step 1: Scan the image I and construct its histogram H(x)[0, 255]. In this histogram obtain peak point a. Step 2: Record the position of pixel value a which is maximum, called key K. Step 3: Scan the watermark. If watermark is binary convert it into decimal value by strcat command. Each value is named as w_d. If counter k is less than length of watermark (a)If scanned pixel value is a, make it w_d. Step 4: Continue step 3 upto end of watermark. If counter k becomes greater than length of watermark, do not change any value upto end of image scanning completes. Extraction and Restoration: The extraction and restoration procedure is given below. Input: Watermarked Image Iw , the peak point a, the key K and the length of the watermark l_w. Output: Original 8 bit grayscale image I and the recovered watermark Iw. Step 1: Scan the image in the same order as in the embedding phase. Step 2: Set counter k=0, k is used to indicate length of watermark. For k is less than length of watermark, l_w, go to step 3 else step 4. Volume 2, Issue 1 January - February 2013
Table II: Embedding Capacity (Bits) of our proposed method 8 BRM RCM DEM HSM Method
Lena 17880 12737 6 13107 2 2235
Table III: Comparison of Pixel Similarity (%) of our proposed 8 bit pixel replacement method (combined with existing geometric transformation counter geometric attack method) (Abbreviations Used:- NCGA-No Counter Geometric Attack, SP-Spy Pixel) a. Extracted Watermark and Original Watermark on Lena Image
8 BRM
Without attack RotationA ttack (900,1800, 2700) Scaling Attack (2) Translatio n Attack(10 ) Exponenti al Pixel Attack(e^ 1.1) NC GA 100 NA GT C 100 100
RCM
NC GA 100 NA GT C 100 100
DEM
NC GA 100 NA GT C 100 100
HSM
NC GA 100 NA GT C 100 100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
NA
100
Page 187
Without attack Rotation Attack (900,180 0 ,2700) Scaling Attack (2) Translati on Attack(1 0) Exponent ial Pixel Attack(e ^1.1)
NA
10 0 10 0
NA
10 0 10 0
NA
10 0 10 0
NA
10 0 10 0
NA
NA
NA
NA
NA
10 0
NA
10 0
NA
10 0
NA
10 0
Due to above method we got 100% pixel similarity of watermark and cover object, which means our proposed method is robust against geometric attack. While recovering against geometric attack we could improve embedding capacity of original image. We also preprocessed our binary watermark. This preprocessing is essential only for binary watermark. Other gray level or color watermark do not needs preprocessing. Result table 1, shows that embedding capacity of our method is more than HSM and quality is more than RCM and DEM. Our method is a compromised method for embedding capacity and quality. Other methods such as RCM is not suitable for all images. Our proposed method is more suitable for cartoon and medical images.
REFERENCES
[1] Tian, J. Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., 2003, 13, (8), pp. 890896 [2] Dinu Coltuc and Jean-Marc Chassery,Very Fast Watermarking by Reversible Contrast Mapping, 1070-9908/$25.00 2007 IEEE, SIGNAL Page 188
Page 189