Upcoming SlideShare
×

# DCT based Watermarking technique

2,114 views
1,937 views

Published on

DCT-based Watermark Recovering
without Resorting to the Uncorrupted Original Image

1 Like
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

Views
Total views
2,114
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
43
0
Likes
1
Embeds 0
No embeds

No notes for slide

### DCT based Watermarking technique

1. 1. DCT Based watermarking recovering withoutrestoring to the uncorrupted Original ImageUmair Amjad umairamjadawan@gmail.com
2. 2. AgendaWatermark embeddingWatermark detection DCT-basedWatermark Recovering without Resorting to the Uncorrupted Original Image A. Piva, M. Barni, F. Bartolini, V. Cappellini Dipartimento di Ingegneria Elettronica Universit`a di Firenze via S. Marta 3, 50139, Firenze, Italy e-mail piva@cosimo.die.unifi.it
3. 3. Watermark EmbeddingRead image. Lets say, I.DCT transform is applied.DCT coefficients are reordered into a zigzag scan.It is now impossible for the decoder to determine the position of the coefficients with thelargest magnitude, since non-marked image is no longer available.T = {t1, t2, . . . . . . , tL, tL+1, . . . . . . , tL+M}To get perceptual invisibility we skipped first L coefficients.Now, watermark X = {x1, x2, . . . . . . , xM} (choose among pseudo-random sequences) isembedded in the last M numbers, to obtain a new vector.T’ = {t1, t2, . . . . . . , tL, t’L+1, . . . . . . , t’L+M}According to the rule:t’L+i = tL+i + α |tL+i| xiWhere i = 1, . . . . . , MNow the vector T’ is inserted in the inverse zigzag scan and the inverse DCT algorithm isperformed, obtaining the watermarked image I’.
4. 4. Watermark DetectionRead watermarked image. Lets say I*.DCT transform is applied.Perform zigzag scan.Now coefficient (L+1)th to (L+M)th are selected to generate a vector.T* = {t*L+1, t*L+2,. . . . . . , t*L+M}The correlation between the corrupted coefficients T*, and the mark itself is taken as ameasure of the mark presence.For this we generate 1000 random fake watermarks.Correlation is computed for each of the marks and that with the largest correlation isassumed to be the one really present in the image.
5. 5. Original Image Waterwark Image
6. 6. Original Image Waterwark Image