• Save
color image watermarking
Upcoming SlideShare
Loading in...5
×
 

color image watermarking

on

  • 1,412 views

 

Statistics

Views

Total Views
1,412
Views on SlideShare
1,412
Embed Views
0

Actions

Likes
2
Downloads
0
Comments
1

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • thaaanks
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

color image watermarking color image watermarking Presentation Transcript

  • OBJECTIVE To provide authenticity or the identity of ownership on images. Protecting digital images against un-authorized use, i.e. duplication, mis-representation and mis- distribution or illegal usage. main focus is to embed a color watermark image in to a color host image.
  • Introduction  Digital watermarking  The process of embedding digital information into a digital signal. - Purpose - Various types of Watermarking - Basic requirements  Invisible Fragile Image Watermarking.  Embed a color watermark image in a color Host Image.
  • Classification
  • Requirements :  The extracted watermark remains intact. i.e., image authentication is guaranteed.  Quality of generated watermarked image should improved. w.r.t. others.  The security issues related to the watermark are provided using a secret key and a hash function.
  • Ideal Properties perceptually invisible to prevent obstruction of original image. statistically invisible, so it can’t be detected or erased. extraction should be simple and accurate. the watermark should be able to determine the true ownership of the Image.
  • Features:  Transparency : Perceptual quality of data being protected.  Robustness : with stand against any intentional transformations.  Capacity : the ability to detect the watermarks with a low probability of error.
  • Process: Host image is divided in to some blocks. Embed watermark at LSB of Blue values of all such blocks . Manipulating only the ‘Blue values’(HVS). No. of host image blocks should be equal to the no. of bit embedded multiplied by the bit size of RGB.
  • Technique: 2-bit scheme Fig: Block diagram
  • Process diagram: 2-bit scheme
  • Technique : 1-bit scheme Fig: Block diagram
  • Process Diagram: 1-bit scheme
  • Algorithm: Embedding  get_blue pixel_info (Yi)  onebit_to_zero (Yip)  hash_for_mesg_digest (Li , K)  extract_onebit (A)  compute_XOR (Hi , Ai)  replace_(Yip , Xi )
  • Execution of Algorithm for Embedding watermark HOST IMAGE (Y) WATERMARK IMAGE (A)
  • H WATERMARK (A) O S T (Y) R G BR G B
  • get_blue pixel_info (Yi) B L U E P L A N E LSB-0 BLUE BIT PLANE (Ybi ) Dividing into Blocks8 BIT-PLANES ONEBIT_TO_ZERO (Li)
  • hash_for_mesg_digest (Li , K)Li Secret Key (K) MD5 1111000010101100 Applying HASH (Li ,K)
  • CO HMP AU ST HEXO XORR R LSB-0 BLUE BIT PLANE B G
  • replace_(Yip , Xi ) LSB-0 Blue bit-plane LSB-1 LSB-2 LSB-3 BLUE PLANE LSB-4 LSB-5 LSB-6 LSB-7
  • WATERMARKED IMAGE GREEN PLANE RED PLANE BLUE PLANE
  • Execution of Algorithm for Extracting watermark  onebit_to_zero (Wi)  hash_for_mesg_digest (L’i , K)  retrieve Wi  compute_XOR
  • Execution of Algorithm for Extracting watermark WATERMARKED R G B
  • B L U E P L A N E LSB-0 BLUE BIT PLANE (Wdbi ) Dividing into Blocks8 BIT-PLANES ONEBIT_TO_ZERO (Li)
  • L’i hash_for_mesg_digest (L’i , K) Secret Key (K) MD5 1111000010101100 Applying HASH (L’i ,K)
  • HASH XORLSB-0 BLUE BIT PLANE (Ri)
  • R G B Extracted watermark (A’i)
  • Observation : We can easily see that Ai= Ai. So our watermark image is retained intact (complete) after extraction, by combining all bit-planes from all blocks.Advantages:  Security  Persistency of Image Quality  At the time of extraction neither the host image nor the watermark image is needed.  Copyright Protection  Tamper Proof verification
  • CONCLUSION AND FUTURE SCOPE Among large variety of watermarking techniques, an attempt has been made to develop color image watermarking scheme for color images. Both host image and watermark images are color images. The extracted watermark remains intact, i.e. image authentication is guaranteed. As a future research scope attempt will be make to develop the framework to semi-fragile watermarking, to detect malicious manipulations on an image, while allowing acceptable manipulations.
  • Thank you