DCT based Watermarking technique

2,114 views
1,937 views

Published on

DCT-based Watermark Recovering
without Resorting to the Uncorrupted Original Image

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,114
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
43
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

DCT based Watermarking technique

  1. 1. DCT Based watermarking recovering withoutrestoring to the uncorrupted Original ImageUmair Amjad umairamjadawan@gmail.com
  2. 2. AgendaWatermark embeddingWatermark detection DCT-basedWatermark Recovering without Resorting to the Uncorrupted Original Image A. Piva, M. Barni, F. Bartolini, V. Cappellini Dipartimento di Ingegneria Elettronica Universit`a di Firenze via S. Marta 3, 50139, Firenze, Italy e-mail piva@cosimo.die.unifi.it
  3. 3. Watermark EmbeddingRead image. Lets say, I.DCT transform is applied.DCT coefficients are reordered into a zigzag scan.It is now impossible for the decoder to determine the position of the coefficients with thelargest magnitude, since non-marked image is no longer available.T = {t1, t2, . . . . . . , tL, tL+1, . . . . . . , tL+M}To get perceptual invisibility we skipped first L coefficients.Now, watermark X = {x1, x2, . . . . . . , xM} (choose among pseudo-random sequences) isembedded in the last M numbers, to obtain a new vector.T’ = {t1, t2, . . . . . . , tL, t’L+1, . . . . . . , t’L+M}According to the rule:t’L+i = tL+i + α |tL+i| xiWhere i = 1, . . . . . , MNow the vector T’ is inserted in the inverse zigzag scan and the inverse DCT algorithm isperformed, obtaining the watermarked image I’.
  4. 4. Watermark DetectionRead watermarked image. Lets say I*.DCT transform is applied.Perform zigzag scan.Now coefficient (L+1)th to (L+M)th are selected to generate a vector.T* = {t*L+1, t*L+2,. . . . . . , t*L+M}The correlation between the corrupted coefficients T*, and the mark itself is taken as ameasure of the mark presence.For this we generate 1000 random fake watermarks.Correlation is computed for each of the marks and that with the largest correlation isassumed to be the one really present in the image.
  5. 5. Original Image Waterwark Image
  6. 6. Original Image Waterwark Image

×