Beruflich Dokumente
Kultur Dokumente
www.cirworld.com
Research Scholar,
JJT University, Jhunjhunu,
Rajasthan-333 001, India
Research Guide,
Parshvanath College of Engineering, Thane (W),
Mumbai-400 615, India
ABSTRACT
This paper presents the method of embedding multiple secrete
information (Logos or Messages etc) one by one into the same
host image which is new topic of research. The method
consists of multiple frequency bands which are altered by
putting the different secrete information at different locations.
The tool used to perform the task is discrete wavelet transform
which provides imperceptibility, robustness and security
requirements. Peak signal to noise ratio, mean square error,
correlation coefficients are the parameters used to check the
effectiveness of algorithm. The algorithm is tested by
applying the same on multiple input images with multiple
secrete information. The existing provides more security than
the normal watermarking schemes as host image is having
multiple secrete information for copyright protection.
General Terms
Digital image watermarking, discrete wavelet transforms,
security, algorithms.
Keywords
Addition, Correlation Coefficients, Discrete Wavelet
Transform, Insertion, Inverse Discrete Wavelet Transform,
Mean Square Error, Peak Signal to Noise Ratio.
1. INTRODUCTION
Digital image watermarking is art of embedding i.e. add or
insert the digital secrete information such as logo, text,
message etc into the digital host image. There are various
tools which are used to embed the secrete information by
manipulating the details of the host image. The hiding process
has to be such that the modifications of details are
imperceptible to the normal human eye. Digital watermarking
came to be in great demand when sharing information on the
internet became a usual practice. Sharing files online, you
never know if someone uses them without your consent. To
prevent unauthorized commerce use of your files, you can
publish them to the web in the worst quality or dont publish
anything worthwhile at all. It isnt a good way to solve the
problem of unauthorized use, is it? So, you should look for
more effective ways of copyright protection, such as digital
watermarking.
A digital watermark is a pattern of bits inserted into a digital
file - image, audio or video. Such messages usually carry
copyright information of the file. Digital watermarking takes
its name from watermarking of paper or money. But the main
difference between them is that digital watermarks are
supposed to be invisible or at least not changing the
perception of original file, unlike paper watermarks, which are
supposed to be somewhat visible.
In this paper, we will discuss the cascade algorithm of image
watermarking which is based on different wavelet
components. Section 2 reviews the literature survey on digital
26 | P a g e
www.cirworld.com
2. RELATED WORK
Authors [1] proposed the watermarking algorithm by using
the tool like discrete wavelet transform and discrete cosine
transform. Z. Yucel, A.B. Ozguler [2] explained new method
for digital image watermarking based on zero assigned filter
banks and embedded zero tree wavelet (EZW) algorithm.
Authors [3] highlighted the review of recent as well as classic
image copy detection method. Paper [4] proposed a novel
watermarking scheme for an image, in which a logo
watermark is embedding into the multiwavelet domain of the
image using neural network. Mauro Barni, Franco Bartolini,
Alessandro Piva [5] explain the improved wavelet-based
watermarking through pixel wise masking. In [6], authors
highlighted that the invisible digital image watermarking can
carry the significant information. Authors [7] discussed the
algorithm to increase the robustness and protection. In paper
[8], A. Essaouabi, E. Ibnelhaj, F. Regragui explained
watermarking scheme that can embed a watermark to an
arbitrarily shaped object in an image. Authors [9] presented a
method for digital image watermarking using Biorthogonal
wavelet transform. A DWT based algorithm is proposed in
[10] where in both blind and non-blind algorithms are used for
copyright protection. In [11], authors successfully explained
the digital image watermarking technique on digital images
based on discrete wavelet transform by analyzing various
values of PSNRs and MSEs.
3. PROBLEM DEFINITION
In case of image watermarking, the secrete information is
inserted into the host image for copyright protection. This
type of applications can be used for copyright protection. In
all the previously presented algorithms, authors have inserted
the secrete information to perform the system better in terms
of performance. The proposed system gives the new approach
to insert the three different secrete information into the same
host image step by step. This way is beneficial for us to
provide the more security, more authentications.
4. PROPOSED ALGORITHM
4.1. Embedding Algorithm
Cascade Insertion Algorithm for adding the Secrete
Information in the input image,
4.1.1.
a)
b)
Stage 1-
c)
d)
e)
f)
g)
h)
i)
4.1.2.
Stage 2-
j)
27 | P a g e
www.cirworld.com
r)
4.1.3.
Stage 3-
s)
4.2.
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
5. PERFORMANCE PARAMETERS
The performance parameters used for comparing the results
are Peak Signal to Noise Ratio (PSNR), Mean Square Error
(MSE), and Correlation Coefficients (CC). The
imperceptibility of a watermark is measured by the
watermarked image quality in terms of Peak-Signal-to- Noise
Ratio (PSNR) (in dB) [9]. The robustness performance of
watermark extraction is evaluated by normalized correlation
coefficient, r, of the extracted watermark A and the original
watermark B.
28 | P a g e
www.cirworld.com
(a)
(b)
(c)
Fig 1: Secrete information (256X256)
(a) 1, (b) 2, (c) 3
The different input images used for experimentation purpose
are shown in figure 2.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(i)
(a)
(b)
(c)
(d)
(h)
(j)
(k)
(l)
Amol
Baby
Boat
Brain
(m)
(n)
Bridge
29 | P a g e
www.cirworld.com
Crowd
Finger
Lax
Lena
Pancard
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Peppers
Diagonal
77.2405 9.7275e-004 0.9930
Horizontal 77.2405 9.7275e-004 0.9797
Vertical
77.2405 9.7275e-004 0.9646
Text
Diagonal
77.2167 9.7275e-004 0.9879
Horizontal 77.2167 9.7275e-004 0.9338
Vertical
77.2405 9.7275e-004 0.8968
Woman
Diagonal
76.1839 9.7275e-004 0.9873
1
Horizontal 76.1839 9.7275e-004 0.9695
Vertical
76.1839 9.7275e-004 0.9447
Woman
Diagonal
78.2167 9.7275e-004 0.9952
2
Horizontal 78.2167 9.7275e-004 0.9890
Vertical
78.2167 9.7275e-004 0.9826
Then, the secrete information extracted from invisible
watermark image with the help of extraction algorithm. Table
2 gives the values of performance parameters of secrete
information and the extracted secrete information.
Table 2: Performance parameters for secrete information
and the extracted secrete information
Input Image
Amol
Baby
Boat
Brain
Bridge
Crowd
Finger
Lax
Lena
Pancard
Peppers
Text
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
30 | P a g e
www.cirworld.com
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.9834
0.9277
0.9449
0.9918
0.9996
0.9995
0.9996
0.9655
0.9853
0.9937
0.9887
0.9939
0.9993
0.9968
0.9911
0.9987
0.9990
0.9992
0.9995
0.9994
0.9995
0.9995
0.9972
0.9985
0.9993
0.9644
0.9820
0.9867
0.9991
0.9985
0.9994
0.9968
0.9989
Woman
1
Woman
2
Vertical
Diagonal
Horizontal
Vertical
Diagonal
Horizontal
Vertical
72.2302
72.2302
72.2302
72.2302
72.2302
72.2302
72.2302
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.0039
0.9987
0.9920
0.9968
0.9995
0.9850
0.9941
0.9989
7. CONCLUSION
We have developed the application for the demonstration of
cascade invisible digital image watermarking with a given set
of secrete information. The application provides the best value
of mean square error (MSE), peak signal to noise ratio
(PSNR) and normalized correlation coefficient (CC) for the
cascade algorithm that determines the robustness of the
secrete information in digital image. The addition algorithm
gives better results than insertion algorithm in case of
watermark image. On the other side, insertion algorithm gives
better result than addition algorithm in case of secretes
information. The developed algorithm not only detect but also
extract the secrete information whenever required. As we have
inserted/added three different secrete information, the
algorithm is healthy enough to provide the maximum
probability of authentication and copyright protection.
8. REFERENCES
[1]. Jumma Dr. Bassim Abdulbaki, Aladdin Arwa 2010,
Image Watermarking using DWT_DCT, Engineering
and Technology Journals, pp. 1-14, Vol. 28, No. 23,
Nov 2010.
[2]. Yucel Z., Ozguler A.B. 2005, An image watermarking
algorithm via zero assigned filter banks, Proceedings of
Fifth IEEE International Symposium on Signal
Processing and Information Technology, pp. 363-368,
Dec 2005.
[3]. Wan Y. H., Yuan Q. L., S. M. He Ji, L. M., Wang Y. L.
2008, A survey of the image copy detection, IEEE
Conference on Cybernetics and Intelligent Systems, pp.
738-743, Sep 2008.
[4]. Zhang Jun, Wang Nengchao, Xiong Feng 2002, Hiding
a logo watermark into multiwavelet domain using neural
network, Proceedings of 14th IEEE International
[5].
[6].
[7].
[8].
[9].
31 | P a g e
www.cirworld.com