Sie sind auf Seite 1von 6

2015 International Conference on Industrial Instrumentation and Control (ICIC)

College of Engineering Pune, India. May 28-30, 2015

A new digital image watermarking algorithm based


on Image interlacing,DWT,DCT
Ms.Mahejabi Khan
Dept. Computer Sc. & Engg.
Rungta College of Engineering &
Technology.Bhilai,India.
mahejabikhan@gmail.com

Mr. Ajay Kushwaha

Mr.Toran Verma

Dept. Computer Sc. & Engg.


Rungta College of Engineering &
Technology Bhilai,India.
ajay.kushwaha@rungta.ac.in

Dept. Computer Sc. & Engg.


Rungta College of Engineering &
Technology Bhilai,India.
toran.verma@rungta.ac.in

AbstractThe availability of digital data such as images, audio


and videos to the public is growing day by day with the expansion
of the Internet . Hence preserving the rightfulness of the data is a
critical factor and the solution is effectively provided by digital
watermarking. Digital watermarking is a developing technology
which ensures and facilitates security, authentication and
copyright protection of digital data. We tries to propose a secure
and robust watermarking algorithm based on the combination of
image interlacing, DWT & DCT techniques. To minimize the
bandwidth requirement during transmission of watermarked
image EBCOT algorithm to compress the image and error
correcting codes are applied to receive error free content at
receiver end.

Fig.1. Watermark Embedding & Watermark Extraction


process.
The original image is called as cover image. The process of
inserting the secret information(noted as watermak) into a
cover image is called as Watermark Embedding and the
image after embedding becomes watermarked image.

Keywords Digital watermarking, Image interlacing, DWT,


DCT, Image deinterlacing, EBCOT algorithm, Error correcting
codes.

This watermarked image is then transmitted into the network


and at receiver end the stored watermark can be retrieve to
ensure the authenticity of digital data,the retrieval process is
called as Watermark Extraction.

I.

INTRODUCTION
The Internet and its applications is growing day by day
which increased the availability of the digital data such as
documents, images, audio, video etc anywhere & at any time.
Hence the issue of information security, authentication of
digital content, preserving & protecting the copyright,
prevention from copying & misusing of content, identification
of owner are the various matter of concern and these can
handle by digital watermarking effectively.

This paper is organized as follows: Section 2 describes


classification of digital watermarking, Section 3 discuss the
literature review, Section 4 describes the techniques of
proposed method, Section 5 contains the proposed
methodology & Finally section 6 holds the result & conclusion.
II.

Digital watermarking is one of the promising area of


information hiding. It includes the protocols, algorithms and its
blueprints to ensure security, authentication and copyright
protection of digital data by preventing access of sensitive
information from unauthorized person in a secure manner by
hiding the secret information into the original digital data.

CLASSIFICATION OF WATERMARK

Digital watermarking is classified into several categories


is as shown below:

Digital watermarking is the art of embedding a secret


information (which may exist in the form of text, image, audio
or video) related to the actual content of the digital data within
the original data itself.
According to [1,5,7].watermark embedding
watermark extraction process is illustrated below:

&

Fig.2. Classification of Digital Watermarking.

978-1-4799-7165-7/15/$31.00 2015 IEEE

885

1) According to Domain:

attack because watermark after extraction comes similar to the


original. Its demerits are Firstly, to hold the original image
both at sender & receiver side more storage capacity is
required. Secondly, because two identical copies of original
image is maintained one is used during watermark embedding
and the other copy is transmitted into the channel as it is,which
enhances the bandwidth requirement[7].

a) Spatial domain: In this technique, the watermark is


embedded by directly changing the pixels of original image[7].
Watermarking in this domain suffers from various hostile
attacks & signal compression[4]. Some of its main algorithm
are Additive watermarking, Least Significant Bit, SSM
Modulation Based Technique, Texture mapping coding
technique, Patchwork Algorithm & Correlation Based
Technique, Intermediate Significant Bit[1,2].

b) Blind Watermarking: To overcome the disadvantages


of non-blind watermarking, blind watermarking is preferred
which dont requires the original image during recovery of
watermark[7].

b) Frequency/Transform domain: This technique embeds


the watermark by changing the frequency components(i.e.
components obtained by an image transformation process.)

III.

of an original image. It offers robust watermarking than spatial


domain and is resistance against signal processing &
geometrical attacks[4]. The most commonly used transforms
are the Discrete Cosine Transform (DCT), Discrete Fourier
Transform (DFT), Discrete Wavelet Transform (DWT) [7].

LITERATURE REVIEW

The common well-known frequency/transform methods


mostly used are DCT & DWT which are used for
watermarking the digital images. Some previous researches are
briefly described below which forms the foundation of our
research work are based on combination of DCT-DWT, image
interlacing based on DWT along with utilizing the concept of
EBCOT algorithm & error correcting codes.

2) According to Documents type:


a) Text watermarking: The watermark is inserted in line
space, between characters space & font shape[2].

Afroja et al.[3] proposed a hybrid watermarking called as


NEA algorithm based on DWT-DCT and it is compared with
Coxs additive algorithm for identical environment,
watermarking is performed by 2 level,3 level, 4 level DWT on
gray scale cover image, followed by DCT on the selected
subband by DWT. The watermark (which is a gray scale
image) is encrypted followed by DCT transform. And after
such processing watermark is embedded into the host image
and reverse is done for extraction.

b) Image watermarking: This technique adds the watermark


into the image[2] .
c) Audio watermarking : The watermark is added into the
audio file[2].
d) Video watermarking: This adds watermark in the video
stream[2] .

Yang Qianli et al.[4] proposed composite watermarking


algorithm based on 2D DWT-DCT for gray scale image. On
host image DWT is applied for 3 level and split the images into
sub blocks, the selected sub blocks is further DCT transformed
, the watermark information(gray image) is also transformed
into DCT. Followed by its embedding & extraction process
techniques proves its robustness against JPEG compression,
noise etc.

3) According to Human Perception:


a) Visible Watermarking: In visible watermarking, the
embedded watermark on the original image can be observed
visually which indicates the owner identification. Its advantage
is easy authentication without any processing but its
disadvantage is easily removal of the embedded watermark[6].
b) Invisible Watermarking:

Keta Raval et al.[5] proposed transform Algorithm based


on DCT-DWT watermarking In this paper original image(gray
level) is decomposed through DWT transform and choosing the
appropriate frequency band in which watermark is embedded.
Then DCT transform is applied for watermarked information(
message image) and on the selected sub band by DWT. The
watermarking information is embedding into the selected
position followed by its embedding & extraction process will
be done.This paper also incorporates the application of EBCOT
algorithm for compression before transmission & error
correcting codes are applied over channel to handle noise &
distortion.Lastly the proposed algorithm proves its robustness
against attacks.

An Invisible watermark the embedded watermark is kept


hidden into the cover image i.e. not visually observed. Its
advantage is it enhance the feature of imperceptibility but is
detected and extracted by an intelligent system according to the
need[6].
Invisible watermarking is classified into two types:
Semifragile/Robust and Fragile watermarking. Semi fragile
watermarking is robust against image processing operation &
attacks such as image scaling,cropping etc. Fragile
watermarking are not much robust & resistance watermark they
can handle only unauthorized changes such as slightest changes
caused due to image distortion[6].

B.Sridhar et al.[6] proposed a robust and secure multiple


watermarking based on DWT. In this paper on the original
image(gray scale) one level interlacing is performed by rows
only (even & odd rows of images) ,to obtain two sub images.
Following this one level DWT is performed to select the
embedding region of both the sub images. Watermark(multiple
gray image) is embedded into deinterlace images using wavelet

4) According to need of original image for watermark


detection:
a) Non-blind Watermarking: It requires the original image
during process of watermark detection[3,7]. Its merit are Firstly,it adds simplicity during watermark detection &
recovery process. Secondly,it adds robustness against various

886

transform. Lastly for extracting the watrermark interlacing &


deinterlacing is again applied. The results achieve excellent
robustness against many geometrical attacks and also it does
not requires the original image during extraction process.

IV.

TECHNIQUES USED IN PROPOSED METHOD

A. Image Interlacing:
Image interlacing (also called as interleaving) is an
operation which divides the original host image into
various subimages.Each sub-image contains the same
number of unrepeated pixels. The content of each subimage is indicated by interlacing algorithm. The reverse
operation of interlacing is called as de-interlacing, it is the
operation which regenerates the original host image by
combining the obtained sub-images[7].

Mohamed M.Ibrahim et al[7]. proposed image interlacing as


a new technique in blind image watermarking system for color
image. In this original image, is interlaced into sub images for
selecting the color band, From the selected pair of sub images
calculated by NC factor one is picked and 3-level DWT
decomposition is done in it followed by embedding of
watermark(here encrypted image)is performed and send to
receiver for extraction. The scheme proves its robustness
against various attacks without any performance drop and also
provides new technique for non-blind watermarking system
which do not requires the original cover image as a whole
during extraction.

Interlacing can de done upto various level but the


limitation exist. More interlacing levels results in more
smaller sub images.Hence the size of the sub images must
be greater than or equal to the size of the watermark[7].

Based on the advantages of hybrid algorithm of DWT-DCT


and Interlacing concept the idea of the proposed methodology
is to interlace the host image(color image) using DWT, the
level of interlacing and DWT depends on the size of the
watermark(which is a message) to be embedded. After
performing DWT the selected area is transformed using DCT
to impart imperceptibility and robustness to the watermark.

The advantage of image interlacing is-It is beneficial


for solving the network communication problem over a
slow internet connection, can works even with the lesser
bandwidth because image interlacing divides the original
image into various subimages and these are loaded in
sequence instead of loading the pixels of the entire original
image completely in an order. As a result, we sometimes
examine that while downloading the image over slow link
the image appears fade and as the connection gradualy
speed up we have the clear view of the image.This
operation leads to decide whether to continue or abort the
tran.mission[7].

After the formation of the watermarked image. Firstly,


compression is done using EBCOT algorithm. Secondly error
correcting codes are used to reduce noise over the
communication channel by detecting and correcting errors. At
the receiver end the reverse processing is done inorder to
extract the watermark.

According to[7], by applying interlacing and then


calculating the NC factor of the sub images, the band for
embedding the watermark is selected.

Hence the proposed technique provides imperceptibility,


security, robustness to the watermarking system against
compression attacks and various distortion by using DWTDCT, EBCOT and error correcting codes. Moreover by
interlacing the copy of the original image will not be required
during extraction which is turn reduces the storage and
bandwidth requirement.

Various image formats that support interlacing are GIF,


JPEG and PNG.
B. DWT
DWT is amongst the most popular technique of the timefrequency transformation. The transformation done by wavelet
transforms allow changes in time extension only, but do not
disturb the shape. Wavelet compression is a type of data
compression technique well suited for compressing an image
(also used for video compression, audio compression). Wavelet
compression technique are adequate for representing transients
and transients elements of data can be represented by lesser
volume of information e.g. of transients components are
striking sounds in audio stream or high-frequency components
in 2D images(an image of stars twinkling on night sky).

Fig.3. shows the basic of DWT approach[5].

887

According to [7],The concept is as follows, In DWT the


original image is passed through a series of low pass and
high pass filters which decompose the image into various
multi resolution sub-bands. These decompositions can be
done at different levels, at the first level, the image is
decomposed into four sub-bands of different resolutions:
LL1 (Approximate), H1(Horizontal), LH1 (Vertical) and
HH1 (Diagonal). Here, LL1 is the low frequency
component, HL1 & LH1 are considered as the middle
frequency component and HH1 are the high frequency
components.

C. DCT
DCT represents data signal in terms of frequency rather
than an amplitude space. This is useful because it is
analogous to the way how humans perceive light, hence the
portion that are not perceived is identified and can be
elliminated. The DCT is mostly used for JPEG image
compression, MJPEG, MPEG and Theora video
compression and many more.
According to [1,5,16], In DCT the original image is
splitted into different frequency components such as
single DC component, lowest frequency components(FL),
highest frequency components(FH) and middle frequency
components(FM). The characteristics of each component
leads to different effects on the watermarking system.FM
is the best region for watermark embedding because this
band minimize to avoid the low frequency
component(important visual components) of the image
which in turn provides additional resistance against signal
processing operation & compression techniques.

This process is repeated until data signals are completely


decomposed or forcefully stopped by an application.
Generally for watermarking or compression application
decomposition are done not more than upto four levels[5].
The low frequency components consists the most
important portions of an image in which any alterations
(embedding of watermark) will leads to original image
distortion . The high frequency components consists of the
least significant portions of the image(such as edges,
texture) and any image processing operations such as
compression will eliminate them.

Real data is transformed to real spectrum using DCT.


Hence it further minimizes the information by removing
the redundant data of an image [4,16].

The Mid frequency components(horizontal & vertical


details) are the best area of emdedding the watermark. But
by the characteristics of human visual system(HVS)
model, the human eyes are more sensitive to vertical
components than horizontal components. Hence the
watermark will be more imperceptible when embedded in
the horizontal detail of middle frequency component[7].

According to [5],for a image of size N*N DCT is defined


in equation 3,4,5 & 6.

According to [8], For image f(x,y) of size M*N is given


in equation 1 & equation 2.

Where W(j0,m,n) is low frequency component &


Wi(j,m,n) is defined as horizontal, vertical , diagonal details
of f(x,y), i={Horizontal, vertical, diagonal}, j0 is arbitrary
scaling factor where j>=j0.

Where F(u,v) is the DCT coefficient of an image in u row & v


column.

Fig. 4. DCT regions[5].

888

Step 3. Calculate Normalized Correlation(NC) between each


pair of sub images

D. EBCOT Algorithm
The uncompressed digital image needs more storage,
bandwidth than the compressed image[5]. To accomplish the
task various still image compression standard such as JPEG,
JPEG2000 and many more exist. With EBCOT(Embedded
block coding optimal truncation) algorithm image
compression is done effectively.

Step 4. Select the pair with highest NC value, select any one
sub image for watermarking and supply the other most similar
sub image in Deinterlacing step.
Step 5. Apply DWT on one of the sub image selected (the
level of DWT is dependent on the size of the watermark).

According to [11,12,13], JPEG2000 standard utilizes the


concept of EBCOT algorithm as the entopy coding step to
store the information and transmit it in a secure and compact
manner.

Step 6. Find the region to embed the watermark.


Step 7. Apply DCT on the selected sub block for embedding
the watermark strongly.

EBCOT algorithm produces scalable compressed


information bits which can be accessed randomly. The
advantage of scalable compression is at the time of
compression the target bits or reconstruction parameters are
not required to be known. It generates single scalable bit
stream which represent the complete image rather than
compressing the image multiple times to achieve the target bitrate. This algorithm works well for remote browsing of huge
compressed image [10].

Step 8. Read the secret information (here message is used) .


Step 9. Apply watermark embedding process in selected
region.
Step 10. The result here is watermarked sub image.
Step 11. Apply IDCT on the watermarked sub image, from the
watermarked sub-image and other sub image choosen from
the pair, deinterlace the red component of the watermarked
image.

E. Channel coding mechanism.


According to [14], Error Correction and Detection is
classified into two categories: 1) Automatic repeat request
(ARQ) or Backward error correction and 2) Error-correcting
code (ECC) or Forward error correction.

Step 12. Watermarked image is generated using the green &


blue component of the host image.
Step 13. Apply DWT, EBCOT algorithm to effectively
compress the watermarked image using JPEG2000
compression standard.

Error occurred during transmission in communication


channel due to distortion/ noise is handled by error-correcting
codes(such as Hamming code or cyclic code). Parity bits are
added with the actual message before transmission in order to
recover the original message by the receiver.

Step 14. The watermarked image is transmitted over


communication channel, which will result in distortion &
noise but the problem is handled by using error correcting
codes.

Shannon's theorem is used to evaluate the maximum


information rate at which communication is possible over a
channel occurs reliably and this can be done by evaluating the
channel capacity.

Step 15. At the receiver end, Select the red component by


separating the RGB component of the received watermarked
image.

Here Additive White Gaussian noise(AWGN)


channel model will be used as the communication channel.
According to[15], its channel capacity is evaluated by:


Steps 16.Apply interlace operation to obtain the pair of sub


image.
Step 17. Apply DWT then DCT on the sub image to extract
the watermark

Where P represent maximum channel power and N is noise


level of the channel.
V.

VI.

PROPOSED METHODOLOGY

RESULT & CONCLUSION

Our theoretical concept of expected result is supported by


the results of the previous researches.

Step 1. Read the original host image(color image), separate its


RGB component & select the red component[7].

Step 2. Interlace the host images into sub images.

889

DWT-DCT is combined to impart robustness over


communication channel against noise & attacks[5] is
illustrated in the figure below:

Fig.7. Interlacing tends to achieve high robustness against


various attacks[7].
Based on the above evaluated results our paper focused on
combining Interlacing, DWT, DCT techniques. The goal of the
proposed method is to minimize bandwidth, storage
requirement of the system using interlacing, compression.
DWT-DCT is responsible for achieving imperceptibility
feature. Robustness & security is imparted into the system
using channel coding technique. The performance of the
proposed method will be evaluated after testing against
different attacks such as Gaussian noise, compression, image
processing, geometric and filtering attacks.

Fig.5. Graph to illustrate BER vs SNR using DWT-DCT[5].


The graph shows that after communication over AWGN
channel the original image and the watermarked image is quite
closer.
x

REFERENCES

Facilitating secure transmission using Error


correcting codes (cyclic codes)[5] is shown below:

[1]

[2]

[3]

[4]

[5]

[6]

Fig.6. Comparative analysis of watermarked image with and


without error correcting codes[5].
x

[7]

Image watermarking using interlacing is evaluated


and its performance is tested with various test
images, also comparison is done with the ordinary
blind watermarking system[7] is as shown below:

[8]

[9]

[10]
[11]
[12]

[13]
[14]
[15]
[16]

890

Mohammad Abdullatif, Akram M.Zeki, Jalel Chebil, Teddy Surya


Gunawan, Properties of Digital Image Watermarking,IEEE 9 th
International Colloqium on Signal Processing & its application,8-10
Mar.2013.
Prabhishek Singh, R S Chadha A Survey of Digital Watermarking
Techniques, Applications and attacs,IJEIT,ISSN : 2277-3754, vol 2,
issue 9,March.2013.
Afroja Akter, Nur-E- Tajnina, Muhammad Ahsan Ullah, Digital Image
Watermarking based on DWT-DCT: Evaluate for a New Embedding
Algorithm,IEEE 3rd International Conference on informatics,
electronics & vision, 2014.
Yang Qianli, Cai Yanhong, A Digital Image Watermarking based on
Discrete Wavelet Transform and Discrete CosineTransform,IEEE
International Symposium on information technology in medicine and
education,2012.
Keta Raval, Sameena Zafar ,Digital Watermarking with copyright
authentication for image communication,IEEE International
Conference on intelligent systems & signal processing, 1-2 march 2013.
B.Sridhar, Dr. C. Arun ,On secure multiple image watermarking
techniques using DWT,IEEE 3rd International Conference
on
computing communication & networking technologies, 26-28 july
2012.
Mohamed M. Ibrahim, Neamat S. Abdel, M. Zorkany, A robust image
watermarking techniques based on image interlacing,IEEE 31 st national
radio science conference, 28-30 april 2014.
Rajesh Mehta, Navin Rajpal, A Hybrid Semi Blind gray Scale Image
Watermarking algorithm based on DWT-SVD using human visual
system model,IEEE 6th international conference on contemporary
computing(IC3), 8-10 Aug 2013.
Ying Zhang, Jiqin Wang, Xuebo Chen Watermarking techniques based
on wavelet transform for color image,IEEE 24th chinese control and
design conference, 23-25 May 2012.
http://maestro.ee.unsw.edu.au/~taubman/publications_files/ebcoticip99.pdf
http://euler.slu.edu/~fritts/papers/spie04_jpg2000_ebcot_arch.pdf
S.Medouakh, Z.E.Baarir,Entropy Encoding EBCOT(Embedded Block
Coding With Optimized Truncation In JPEG2000), IJCSI, Vol 8,ISSN
04, July 2011.
Module-6
Still
image
compression
standards,
http://nptel.ac.in/courses/.../ssg_m6l17.pdf
http://en.wikipedia.org/wiki/Error_detection_and_correction
http://en.wikipedia.org/wiki/Additive_white_Gaussian_noise
http://www.math.tau.ac.il/~turkel/notes/JPEG.pdf

Das könnte Ihnen auch gefallen