A robust and secure visible watermarking scheme based on multi

191 views

Published on

Published in: Technology, Art & Photos
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
191
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

A robust and secure visible watermarking scheme based on multi

  1. 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME240A ROBUST AND SECURE VISIBLE WATERMARKING SCHEMEBASED ON MULTI WAVELET TECHNIQUE WITH MODIFIRD FASTHAAR TRANSFORM [MFHWT]Shefaly Sharma1, Jagpreet Kaur21(Computer science and engg., Lovely Professional University, Jalandhar, India)2(Computer science and engg., Lovely Professional University, Jalandhar, India)ABSTRACTInternet has rapidly become popular worldwide and we can see that people are sharinghuge amount of data [photos, videos, audio files and other crucial information] throughInternet. So security of data is becoming a crucial issue. In this paper, we are providing a robustimage watermarking technique. We are going to apply watermarking using multi wavelettransformation with modified fast Haar wavelet transformation [MFHWT]. Watermarking is atechnique by which user can get copyright protection of the data so that no other person is ableto use it without the permission of its ownerKeywords: Visible Watermarking, MFHWT, Multi Wavelets, PSNR, MSE.I. INTRODUCTIONThere are a lot of changes being made in the field of internet and multimedia. Now days,it has become possible to create, manipulate, and transmit data at much higher rates due to theadvancements being made. Protection of multimedia content has become challenging due tothe threats of data authentication, and protection against illegal use of data are being increasedso security has become one of the most significant and challenging problems. Watermarking isone of the popular techniques of image processing. It is used to observe authentication oflicensed user over e-commerce applications and finds its use in illegal applications like copyingmultimedia data. A Watermark system consists of key (public key and private key). The use ofkey provides security i.e. prevents unauthorized use of data.[7]INTERNATIONAL JOURNAL OF ADVANCED RESEARCH INENGINEERING AND TECHNOLOGY (IJARET)ISSN 0976 - 6480 (Print)ISSN 0976 - 6499 (Online)Volume 4, Issue 2 March – April 2013, pp. 240-247© IAEME: www.iaeme.com/ijaret.aspJournal Impact Factor (2013): 5.8376 (Calculated by GISI)www.jifactor.comIJARET© I A E M E
  2. 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME2411. Technologies used for Security of Multimedia1.1 FingerprintingIt is a technique which is used to protect data from unauthorized redistribution. It is used forembedding a unique ID called fingerprint into each users copy for representing anti collisioncode [ACC], which can help to identify the criminal when an unauthorized link is found[5]1.2 CryptographyIt is a technique used for secure communication. It converts data into such a form that it canonly be read by the receiver. No other person is able to detect it. So for secure communication ituses public and private keys. These keys are only known to sender and receiver. If other personwants to read the data than he first needs to know the key value, and detecting this key value isnot an easy task.[3].1.3 SteganographyIt is a method of hiding message such that only the sender and receiver are able to read themessage. It replaces the bits of useless data in regular files with bits of different, invisibleinformation. The hidden information can be image or text.[7]1.4 WatermarkingIt is used to provide copyright protection and also provides robustness against various attacks.Watermarking is one of the popular techniques of image processing. It is used to observeauthentication of licensed user over e-commerce applications and finds its use in illegalapplications like copying multimedia data. A Watermark system consists of key (public keyand private key). The use of key provides security i.e. prevents unauthorized use of data.[3]2. Visible WatermarkingVisible Watermarking is a process by which we embed data into digital and analogcontent in order to identify its owner. And then watermark becomes a permanent part of thecontent, even it is distributed to others. These are similar to watermarks used on paper. Visiblewatermark change the signal such that it is different from the actual signal. Watermark act as aseal which is placed on an image to provide copyright protection. For e.g. if a photographycompany shares its photographs on internet and wants copyright protection for its data thenthey can add a watermark to their data so that no other person can use it with a watermark on itwithout their permission. Visible watermark is also used to indicate ownership originals tomonitor and track how his image is being use.[7]3. Types of Watermark3.1 Visible WatermarkingIt is visible semi-transparent text or image overlapped on the original image. In this we are ableto look at the original image but it also provide copyright protection. These watermarks aremore robust against transformation of image. Thus they are preferred for strong copyrightprotection digital form.[7]
  3. 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME2423.2 Invisible watermarkingIt is invisible text or image overlapped on original image. In this we cannot see the image. Onlyelectronic devices can extract the hidden information to identify the copyright owner. Invisiblewatermarks are used to provide authentication.[7]3.2.1 RobustIn this case, watermark is embedded in such a way that if any changes are done to the pixelvalue in the image then it will be unnoticeable and can on it be recovered using decodingmechanism [7]3.2.2 FragileIn this case, watermark is embedded in such a way that if any changes are done in thewatermarked image then the image would either alter or will destroy the watermark.[7]Figure 1: Types of Watermark4. Characterstics of WatermarkThere are three characteristics of watermarking. If we will increase any one feature then othersget decreased. So we should apply it according to our needs
  4. 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME2434.1 Maximal CapacityThis is a watermarking technique in which the size of watermark to be applied should be suchthat it should not degrade the quality of the image.[4][7]4.2 RobustnessThis is a watermarking technique in which watermarked image should stand against imagecompression, noise and cropping effects. [4][7]4.3 ImperceptibilityHuman eye should not be able to make any difference between the original image and theimage to which watermark has been applied.[4][7]4.4 SecurityOur watermark should be able to provide security against unauthorized access to thewatermark.[4][7].5. Wavelet TransformationWavelet transformations are used to solve difficult problems of physics, computers, andmathematics. I t provides various applications like compression, image processing, signalprocessing, etc. It allows difficult problems to be decomposed into elementary form and thenreconstructed with high precision.[6][7]6. Haar TransformHaar transformation performs average and differentiation functions for deleting data,sorting coefficients, reconstructing the matrix such that final matrix is similar to initialmatrix.[7]7. Modified Fast Haar Wavelet TransformMFHWT is used for 1D approach. It is faster than fast Haar transformation (FHT). Byapplying this method we get improved values of approximation and coefficients that fast haartransformation (FHT) and Haar transformation (HT) because in MFHWT we need to store halfof the original data and hence memory used in this case is also less.[1]II. PROPOSED SCHEMEIn this paper, to overcome the limitations of DWT with modified Haar wavelettransform and wavelet packet transform we will design an algorithm which is robust enoughthat it can withstand different transmission parameters e.g. Compression filters, Reform attack,File an original copy.STEP 1: Take an imageSTEP 2: Apply multi wavelet packets.STEP 3: Input text into decomposed sub bands.STEP 4: Inverse of transformation.STEP 5: Obtain image
  5. 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME244III. EXPERIMENTAL RESULTSFigure 2: GUI Interface for Visible WatermarkingFigure 3: Watermark applies to the top left of original image
  6. 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME245Figure 4: Watermark applied at the Right top of the original ImageFigure 5: Watermark applied at the Center of original Image
  7. 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME246IV. RESULTS AND CALCULATIONSAfter the experiments performed on registered Images in MATLAB, we have realized thatabove factors determine the quality of watermarked image. Our technique is better than those ofother techniques of digital watermarking, because this technique provides high quality ofinformation. The quality of image is measured by PSNR.Table 1: Visible Image WatermarkingTable 2: Text WatermarkingV. CONCLUSIONA number of techniques have been proposed for watermarking; however our proposedtechnique is better than other techniques as this technique provide better quality of image afterapplying watermark on the original image.PositionofWatermark.Left Top Right Top LeftBottomRightBottomCenterWatermarkImagesPSNRValues47.2473 45.2146 45.8974 45.31 46.2579TextWatermarkImagesPSNR Values 26.3609
  8. 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME247VI. REFERENCES[1] Ali Rashid, Bhardwaj Anuj ,2009, “Image compression using modified fast haar wavelettransform, “world applied sciences journal[2] Damien Adams, Patterson Hasley, 2006, ‘The Haar Wavelet Transform: compression andReconstruction’.[3] Dittmann Jana, Wohlmacher Petra Nahr, 2011, “Using cryptographic and watermarkingalgorithms,” IEEE.[4] Hanna Tawfik Magdy, Saaid Monir Mary, Nossair Bassyouni Zaki, 2011, ‘An ImageWatermarking Scheme Based on Multiresolution Analysis’,IEEE[5] Hu Defa , Li Qiadiang, 2011, “A simple fingerprinting scheme for large user groups,”Springer.[6] Islam R M, Sifuzzaman R M, Ali Z M , 2009, ‘Application of Wavelet transform and itsadvantages compared to Fourier transform’, Journal of Physical science.[7] Sharma Shefaly, Jagpreet Kaur, 2013, “An efficient technique of Watermarking usingMultiwavelets with Modified Fast Haar Wavelet Transform’, IJITEEE.[8] Dr. Sudeep D. Thepade and Jyoti S.Kulkarni, “Novel Image Fusion Techniques usingGlobal and Local Kekre Wavelet Transforms”, International Journal of ComputerEngineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 89 - 96, ISSN Print:0976 – 6367, ISSN Online: 0976 – 6375.[9] G. B. Khatri and D. S. Chaudhari, “Digital Audio Watermarking Applications andTechniques”, International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 109 - 115, ISSN Print: 0976- 6464,ISSN Online: 0976 –6472.[10] Sambhunath Biswas and Amrita Biswas, “Fourier Mellin Transform Based FaceRecognition”, International Journal of Computer Engineering & Technology (IJCET),Volume 4, Issue 1, 2013, pp. 8 - 15, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

×