International Journal of Computer Engineering COMPUTER ENGINEERING & –     INTERNATIONAL JOURNAL OF and Technology (IJCET)...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Vol...
Upcoming SlideShare
Loading in …5
×

Invisible water marking within media files using state of-the-art technology

662 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
662
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Invisible water marking within media files using state of-the-art technology

  1. 1. International Journal of Computer Engineering COMPUTER ENGINEERING & – INTERNATIONAL JOURNAL OF and Technology (IJCET), ISSN 0976 TECHNOLOGY (IJCET)6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEMEISSN 0976 – 6367(Print)ISSN 0976 – 6375(Online)Volume 3, Issue 3, October - December (2012), pp. 01-08 IJCET© IAEME: www.iaeme.com/ijcet.html ©IAEMEJournal Impact Factor (2012): 3.9580 (Calculated by GISI)www.jifactor.com INVISIBLE WATER MARKING WITHIN MEDIA FILES USING STATE-OF-THE-ART TECHNOLOGY 1. Karimella Vikram Head of the Dept. of CSE Medak College of Engineering & Technology Siddipet, Kondapaka, Meddak, (RR) Email Id: vikramkarimella@yahoo,com 2. Dr. V. Murali Krishna Prof.& Principal Murthy Institute of Technology & Science AnkiReddy pally, Kesara, Hyderabad Email: Vmkrishna99@yahoo.com 3.Dr. Shaik Abdul Muzeer Professor & Director of PG studies Siddhartha Institute of Engineering & Technology Ibrahimpatnam, R.R.. Dist. e-mail: bdl_muzeer @ yahoo.co.in 4.Mr.K. Narasimha Assoc.Professor & HOD of E.C.E. Murthy Institute of technology AnkiReddy pally, Kesara, Hyderabad Email : nrsimha_9@yahoo.comABSTRACTThis paper facilitates the techniques to be used with the images that cannot be misused byunauthorized users. This method is to provide the security for images by using key concepts. TheInvisible Watermarking concept is used for secret message and images to send one node to anothernode with a private key. A package is developed to attain the above said technology. This package ismainly applicable for a software company which focuses on how to secure the data from the hackerswhile transferring the information. It gives controlled redundancy, data independence, more accuracyand integrity, privacy and security and also a good performance.Keywords- Invisible Watermarking, Stegnography, Encryption1. INTRODUCTIONDIGITAL watermarking is a process of embedding marks which are typically invisible and that canbe extracted only by owner’s authentication. This technology is to be used with the image that cannot 1
  2. 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEMEbe misused by the unauthorized users. This allows one to do without any distortion and keeping muchbetter stegno-image quality, also in a reliable and secured manner guaranteeing efficient retrievals ofsecret file. Digital watermarking finds wide application in security, authentication, copyrightprotection and all walks of internet applications. There has been effective growth in developingtechniques to discourage the unauthorized duplication of data and applications. The watermarkingtechnique is one, which is feasible to design to protect the data and also applications related The term’cover’ is used to describe the original message in which it will hide our secret message, data file orimage file. Invisible watermarking and visible watermarking are the two important types of the abovesaid technology. The main objective of this package is to reduce the unauthorized duplication of dataand application, provide security, authentication, and copyright protections to all walks of internetapplications. During the implementation stage, the system is physically created, necessary programsare coded, debugged and documented and operating procedures are developed. The test plan is alsoestablished. Based on the specification above, the necessary code is developed in “.NET” and testedsuccessfully with the test data. Software is tested with real data and the report generated are accurateand error free. The system is portable and flexible for further development. It gives user friendlyscreens to enter data and enquire database. It is also tested on various browsers in order to check theconsistency and reliability. This application has a great impact on the people who want to gather latestinformation and very useful as well as user friendly.2. PROBLEM IDENTIFICATIONHere the problem is to transfer a message in a safe and secure way. Previously we had used themethod of cryptography to transfer a message in a safe way with the help of encryptions anddecryptions algorithm. Growth of internet transferring a message or file using this concept made aproblem since the hackers easily hack the data. To overcome this problem a new technique calledwatermarking is used. In this technique the information is using with a media file (image, audio, andvideo).Visible Watermarking means information hidden with image but that has visible on the image.It also made problem to transfer data. So the invisible watermarking scheme is selected fortransferring the information. In this method, the information is hidden with media file, whiletransferring data it fully converted as media file. When the receiver wants to retrieve it, he will openwith the help of the private key of receiver. As we are transferring message embedded with image,audio, video file, while transferring data from sender to receiver it is necessary to encrypt it by privatekey. After decryption, the information fully converted as the media file. The receiver decrypts themessage whenever he wants to access by the same key. Likewise, we are transferring the messagewith media file.3. PROPOSED SYSTEMThe most widely used existing method is encryption, which takes data and mixes it up with analgorithm and a key to output unreadable data. The receiver then must also have a key to decrypt thedata in order to read it. Another form of data hiding is encryptions using steganography.Steganography is the act of hiding data inside other data. For example, hiding the words into animage. But we can conceal limited words into image here. The digital images can be protected fromillegal copying and manipulation through the digital watermarking technique. Commonly,watermarking is built to endure un-malicious or malicious attacks like scaling, cropping, compressionand so forth. It is chiefly intended towards copyright Protection. The proposed watermarking schemeis blind, since it doesn’t require the original image or any of its characteristics for the extraction ofwatermark. This scheme makes use of a binary image as watermark data for protecting the copyrightsof images. The term cover is used to describe the original message in which it will hide our secretmessage, data file and image. Once it embeds our secret file into the cover, the new image is knownas the stegno image.3.1 Software Requirement SpecificationThe software requirements specification (SRS) is produced at the culmination of analysis taskestablishing a complete functional descriptor. Design constraints and the other data pertinent to 2
  3. 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEMErequirements and refines the function and performance allocated to software as part of the systemengineering. This is the base of all software engineering activities that flow.3.2 Formal DescriptionThis technology mainly contains four modules, namely authentication, embedding, retrieval moduleand data transmission. In that embedding technique covers message embedding, word documentembedding and image embedding. Retrieval module consists of message retrieval, word documentretrieval and also image retrieval. Application architecture is as shown in fig. 2. The main objectivesconcentrated in data design are, controlled redundancy, data independence, accuracy and integrity,privacy and security also performance.4. FUNCTIONAL DESIGNFunctional design is otherwise known as hierarchy (or) structural chart. It is a graphical tool forrepresenting hierarchy. The following principles are used for architectural design.4.1 Modularity and PartitioningEach system should consist of a hierarchy of modules. Lower level modules are generally small inscope and size compared to higher level modules and serve to partition processes into separatefunctions.4.2 CouplingModules should have little dependence on other modules in a system. Coupling between the modulesis the strength of interconnection between modules (or) a measure of interdependence amongmodules. There are two types of coupling. First one is highly coupled (modules are joined by stronginter connections), and the second one is loosely coupled (modules have weak inter connections).4.3 Interface DesignThe user interface design activity focuses on supporting the interaction between the user and thedeveloped site. User Interface design is frequently a prototyping process where the working models orprototypes of user interface methods are design and modified several times with the feedback from thecustomer. Data design activity focus on the design of the structure of the database and files to be usedby the proposed websites. In this paper the data design of the website have a detailed description ofdata flow.5. PROCESS DESIGNThis activity focuses on the design of the user interaction forms i.e. the program and proceduresneeded to develop the forms. (See fig. 1 , 2)5.1 System SpecificationIt formalizes the design of the applications user interface methods, Database structures andprocessing, and controlled procedures. Therefore system designers will frequently develop hardware,software, data and personal specifications for proposed system.5.2. Low Level DesignThe procedural design or component level design is also treated as low level design which will dealwith the lowest level of the functional details such as implementation details etc., Addition andmodification of user information procedure is given below.5.3 Adding User informationFunction Name : Adding User informationInput : Reading User details 3
  4. 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEMEOutput : Store User details to the databaseProcess : Display the User detailsD. Modify User informationFunction Name : Modify User informationInput : Reading User detailsOutput : Store User details to the databaseProcess : Display the User details Fig-1: Process Flow Fig(2) Application architecture 4
  5. 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME6. IMPLEMENTATIONOperating procedures must be developed. The test plan must be established. The implementation stagenormally ends Execution is the stage of the system when the theoretical design is turned into aworking system. During the implementation stage, the system is physically created, necessaryprograms are coded, debugged and documented and with formal system test involving all componentsand procedures if the implementation stage is not carefully planned and controlled. It can cause chaos.Thus it can be considered to be the most crucial stage in achieving a new successful system. Based onthe specification above, the necessary code is developed in “.NET” and tested successfully with thetest data (See Fig. 3). Fig-3: Watermarking Settings Screen7. FORSEEABLE ENHANCEMENTSEvery application has its own merits and demerits. This invisible watermarking technology hascovered almost all the requirements. Further requirements and improvements can easily be done sincethe coding is mainly structured or modular in nature. Changing the existing modules or adding newmodules can append improvements. Further enhancements can be made to the application, so that thewindows functions very attractive and useful manner than the present one.8. CONCLUSIONWe hope that the developed software would be of great help in the process of transferring data in asecured way. This is used to automate secure file management system and to overcome clientdifficulties by providing all the latest information to achieve the desire goals of them. This softwareincludes all the facilities like navigation from one page to another page using links. Software is testedwith real data and the report generated are accurate and error free. The system is portable and flexiblefor further development. It gives user friendly screens to enter data and enquire database. It is alsotested on various browsers in order to check the consistency and reliability. This application has agreat impact on the people who want to gather latest information and very useful as well as userfriendly. 5
  6. 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEMEREFERENCES1] Vashistha, A.; Nallusamy.R: Das.: Paul.S.;” Watermarking video content using visual cryptography andscene averaged image, Multimedia and Expo (ICME)”, International Conference on IEEE, 2010, PP.: 1641 –1646.[2] Xiaozhong Pan: Bo Tao Yan: Ke Niu; “Multiclass detect of current steganogrphic methods for JPEG formatbased re-stengoraphy,” international Conference on Advanced Computer Control (ICACC), 2010, PP.: 79- 82.[3] Jinsuk Baek; Kim Cheonshik; Fisher, Paul S.; Hongyang Chao; (N,I) “Secret sharing approach based onsteganography with gray digital images”, IEEE International Conference on Wireless Communications,Networking and Information Security (WCNIS) 2010,pp: 325 – 329.[4] Ying Zhang; Jun Xiao; Ying Wang; “Side informed image watermarking algorithm with high securityInformation”, IEEE Youth Conference on Computing and Telecommunication, 2009, PP: 395-398[5] Mehboob, B. Faruqui, R.A.; “A stenography implementation” International Symposium on Biometrics andSecurity Technologies ISBAST, 2008, pp. 1-5.[6] Shu-Chien Huang: Chu-Fu-Wang; “The image Watermarking Technique Using Visual Secret SharingStrategy”, Eight International Conference on Intelligent Systems Design and Applications ISDA,2008 vol. :2pp: 190 – 195.[7] Mohanty, S.P; Sheth, R,; Pinto, A.; Chandy, M.; “Crypt Mark: A Novel Secure Invisible WatermarkingTechnique for Color Images”, IEEE on Consumer Electronics, 2007, [8] Bartlow , N.; Kalka, N.; Cukic, B.; Ross, “Protecting Iris Image through Asymmetric DigitalWatermarking”, IEEE workshop on Automatic Identification Advanced Technologies, 2007 pp: 192-197.[9] Moon, S.K.; Kawitkar, R.S. “Data security using data hiding”, International Conference on Conference onComputational Intelligence and Multimedia Applications, 2007, pp: 247 – 251.[10] Au, O.C, “ Joint visual cryptogtaphy and watermarking Ming Sun Fu”; IEEE International Conference onMultimedia and Expo, ICME 2004, Vol.: 2 ,pp: 975–978.[11] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proc. IEEEInt. Conf. Acoustics, Speech,Signal Processing (ICASSP ’96), vol. 4, Atlanta, GA, May 1996, pp2168–2171.[12] A. Piva,M. Barni, F. Bartolini, and V. Capellini, “DCT-based watermark recovering without resorting tothe uncorrupted original image,” in ProcIEEE Int. Conf. Image Processing (ICIP’97), vol. 1, Santa Barbara,CA,Oct. 1997, pp. 520–523.[13] T. N. Pappas, “An adaptive clustering algorithm for image segmentation,”IEEE Trans. Signal Processing,vol. 40, pp. 901–914, Apr. 1992.[14] R. L. Devaney, An Introduction to Dynamical Systems. New York:Penjamine/Cummings, 1986.[15] L. Vincent and P. Soille, “Watersheds in digital spaces: An efficient algorithm based on immersionsimulations,” IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 583–598, June 1991.[16] L. Vincent, “Morphological grayscale reconstruction in image analysis: Applications and efficientalgorithms,” IEEE Trans. Image Processing, vol. 2, pp. 176–201, Feb. 1993.[17] A. S. Wright and S. T. Acton, “Watershed pyramids for edge detection,”in Proc. IEEE ICIP ’97, SantaBarbara, CA, Oct. 1997, pp. 578–581.[18] D. Cortez, P. Nunes, M. M. de Sequeira, and F. Pereira, “Image segmentation toward new imagerepresentation models,” Signal Process.:Image Commun., vol. 6, no. 6, pp. 485–498, 1995.[19] J. Besag, “On the statistical analysis of dirty pictures,” J. R. Statist. SocB, vol. 48, no. 3, pp. 259–302,1986.[20] J. Luo, R. T. Gray, and H.-C. Lee, “Incorporation of derivative priors in adaptive Bayesian color imagesegmentation,” in Proc. ICIP ’98, vol. 3,Chicago, IL, Oct. 1998, pp. 780–784.21.Zhu98a] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution watermarking for images andvideo: a unified approach. In Proceedings of the IEEE International Conference on Image Processing, ICIP 98,Chicago, IL, USA, October 1998.22.[Xie98a] Liehua Xie and Gonzalo R. Arce. Joint wavelet compression and authentication watermarking. InProceedings of the IEEE International Conference on Image Processing, ICIP 98, Chicago, IL, USA, 199823 Adelson87a] Edward H. Adelson, Eero P. Simoncelli, and Rajesh Hingorani. Orthogonal pyramidtransforms for image coding. In Proceedings of SPIE, volume 845, October 1987.[Algazi95a] V. R. Algazi and R. R. Estes.24Analysis based coding of image transform and subband coefficients. In Applications of Digital ImageProcessing XVII, Proceedings of the SPIE,, volume 2564, pages 11 - 21, 1995.25.[Benham97a] Dave Benham, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Fast atermarking ofDCT-based compressed images. In Hamid R. Arabnia, editor, Proceedings of the International Conference onImage Science, Systems, and Technology, CISST 97, Las Vegas, USA, 1997. 6
  7. 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME27 [Bottou98a] Leon Bottou, Patrick Haffner, Paul G. Howard, Patrice Simard, Yoshua Bengio, and YannLeCun. High quality document image compression with djvu. Journal of Electronic Imaging, July 1998.28. [Bruyndonckx95a] O. Bruyndonckx, Jean-Jacques Quisquater, and Benoit M. Macq. Spatial method forcopyright labeling of digital images. In IEEE Workshop on Nonlinear Signal and Image Processing 95,Thessaloniki, Greece, pages 456 - 459, 1995.29 [Buccigrossi97a] Robert W. Buccigrossi and Eero P. Simoncelli. Progressive wavelet image coding basedon a conditional probability model. In Proceedings of the IEEE International Conference on Acoustics, Speechand Signal Processing, ICASSP 97, Munich, Germany, April 1997.30. [Corvi97a] Marco Corvi and Gianluca Nicchiotti. Wavelet-based image watermarking for copyrightprotection. In Scandinavian Conference on Image Analysis SCIA 97, Lappeenranta, Finland, June 1997.31.[Cox97b] Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal G. Shamoon. Secure spread spectrumwatermarking for multimedia. In Proceedings of the IEEE International Conference on Image Processing, ICIP97, volume 6, pages 1673 - 1687, Santa Barbara, California, USA, 1997.32. [Davis97a] Geoffrey M. Davis and Sumit Chawla. Image coding using optimized significance treequantization. In Proceedings of Data Compression Conference, pages 387 - 396, 1997.33. [Dugad98a] Rakesh Dugad, Krishna Ratakonda, and Narendra Ahuja. A new wavelet-based scheme forwatermarking images. In Proceedings of the IEEE International Conference on Image Processing, ICIP 98,Chicago, IL, USA, October 1998.34.[Fridrich97a] Jiri Fridrich. Methods for data hiding. Technical report, Center for Intelligent Systems, SUNYBinghamton, USA, 1997.35.[Fridrich98c] Jiri Fridrich. Combining low-frequency and spread spectrum watermarking. In Proceedings ofthe SPIE Symposium on Optical Science, Engineering and Instrumentation, San Diego, USA, July 1998.36.[Inoue98a] Hisashi Inoue, Akio Miyazaki, Akihiro Yamamoto, and Takashi Katsura. A digital watermarkbased on the wavelet transform and its robustness on image compression. In Proceedings of the IEEEInternational Conference on Image Processing, ICIP 98, Chicago, IL, USA, 1998.37.[Kim99c] Jong Ryul Kim and Young Shik Moon. A robust wavelet-based digital watermark using level-adaptive thresholding. In Proceedings of the 6th IEEE International Conference on Image Processing ICIP 99,page 202, Kobe, Japan, October 1999.38.[Koch95a] Eckhard Koch and Jian Zhao. Towards robust and hidden image copyright labeling. InProceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 452 - 455,Halkidiki, Marmaras, Greece, June 1995.39.[Kundur98a] Deepa Kundur and Dimitrios Hatzinakos. Digital watermarking using multiresolution waveletdecomposition. In Proceedings of IEEE ICASSP 98, volume 5, pages 2969 - 2972, Seattle, WA, USA, May1998.40.[Kutter97a] Martin Kutter, Frédéric Jordan, and Frank Bossen. Digital signature of color images usingamplitude modulation. In Ishwar K. Sethi, editor, Proceedings of the SPIE Conference on Storage and Retrievalfor Image and Video Databases, volume 2952, pages 518 - 526, San Jose, USA, 1997.41.[Langelaar97a] Gerrit C. Langelaar, Reginald L. Lagendijk, and Jan Biemond. Robust labeling methods forcopy protection of images. In Ishwar K. Sethi, editor, Proceedings of the SPIE Conference on Storage andRetrieval for Image and Video Databases, volume 3022, San Jose, USA, 1997.42.[Pennebaker93a] W. B. Pennebaker and J. L. Mitchell. JPEG Still Image Compression Standard. VanNostrand Reinhold, New York, 1993.43.[Petitcolas99c] Fabien A. P. Petitcolas and Ross J. Anderson. Evaluation of copyright marking systems. InProceedings of IEEE Multimedia Systems 99, volume 1, pages 574 - 579, Florence, Italy, June 1999.44.[Said96a] Amir Said and William A. Pearlman. A new, fast, and efficient image codec based on setpartitioing in hierarchical trees. In IEEE Transactions on Circuits and Systems for Video Technology, volume 6,pages 243 - 250, June 1996.45.[Shapiro93a] Jerome M. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. In IEEETransactions on Signal Processing, volume 41, pages 3445 - 3462, December 1993.46.[Voyatzis98a] George Voyatzis and Ioannis Pitas. Digital image watermarking using mixing systems.Computer & Graphics, 22 pp. 405 - 416, August 1998.47.[Wang98b] Houng-Jyh Wang, Po-Chyi Su, and C.-C. Jay Kuo. Wavelet-based digital image watermarking.Optics Express, 3 pp. 497, December 1998.48.[Xia98a] Xiang-Gen Xia, Charles G. Boncelet, and Gonzalo R. Arce. Wavelet transform based watermarkfor digital images. Optics Express, 3 pp. 497, December 1998.49.[Xie98a] Liehua Xie and Gonzalo R. Arce. Joint wavelet compression and authentication watermarking. InProceedings of the IEEE International Conference on Image Processing, ICIP 98, Chicago, IL, USA, 1998.50. [Zhu98a] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution watermarking for images andvideo: a unified approach. In Proceedings of the IEEE International Conference on Image Processing, ICIP 98,Chicago, IL, USA, October 1998. 7
  8. 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEMEAUTHORS K.Vikram is working as a Vice-Principal at Medak College of Engineering and Technology (MCET), Hyderabad, India. He has received MCA and ME.(Computer Science and Engineering) from Anna University. Presently, he is a Research Scholar. He has published and presented good number of technical papers in National and International Conferences. His main research interests are Software Engineering, Data Mining, and Network Security. Dr. V. Murali Krishna is a Prof.& Principal of Murthy Institute of Technology and Science.. He received M.Tech from JNTUH and Ph.D from MGKVP University. He Published so many Papers in national & Inter National Journals. His research areas are data Mining and Image Processing, Wireless Communications. He is member of MISTE Dr.S.A.Muzeer is Graduated from Andhra University college of Engineering, Visakhapatnam in the year 1984 in Electronics & Communication Engineering. He completed his post graduation from Osmania University Engineering college with specialisation in Digital systems Engineering.. He obtained his Doctoral degree from Bundel Khand university in the year 2006. His areas of interest are DSP and Instrumentation. Mr. K. Narasimha working as Assoc. Prof. & HOD of ECE Dept. in MITS. He published so many papers and Journals. His interest areas are Image Processing, Microwave Engineering ,Data Communications, DSP and VLSI. He has received B.E & M.E from Osmania University. 8

×