SlideShare a Scribd company logo
1 of 9
Download to read offline
ISSN 1749-3889 (print), 1749-3897 (online)
International Journal of Nonlinear Science
Vol.9(2010) No.3,pp.358-366
Effect of Block Sizes on the Attributes of Watermarking Digital Images
M. O. Agbaje 1
, A. T. Akinwale1
, O. Folorunso 1
, A. N. Njah 2 ∗
1
Department of Computer Science, University of Agriculture, Abeokuta, Nigeria.
2
Department of Physics, University of Agriculture, Abeokuta, Nigeria.
(Received 22 July 2008, accepted 11 March 2009)
Abstract: This work examines the effect of block sizes on attributes (robustness, capacity, time of water-
marking, visibility and distortion ) of watermarked digital images using Discrete Cosine Transform (DCT)
function. The DCT function breaks up the image into various frequency bands and allows watermark data
to be easily embedded. The advantage of this transformation is the ability to pack input image data into a
few coefficients. The block size 8 x 8 is commonly used in watermarking. The work investigates the ef-
fect of using block sizes below and above 8 x 8 on the attributes of watermark. The attributes of robustness
and capacity increase as the block size increases (62-70db, 31.5-35.9 bit /pixel). The time for watermarking
reduces as the block size increases. The watermark is still visible for block sizes below 8 x 8 but invisible
for those above it. Distortion decreases sharply from a high value at 2 x 2 block size to minimum at 8 x 8
and gradually increases with block size. The overall observation indicates that watermarked image gradually
reduces in quality due to fading above 8 x 8 block size. For easy detection of image against piracy the block
size 16 x 16 gives the best output result because it closely resembles the original image in terms of visual
quality displayed despite the fact that it contains a hidden watermark.
Keywords: discrete cosine transform; watermark attributes; multimedia; block sizes
1 Introduction
Watermarking is one of the multimedia (multiple form of media- text, graphics, images, animation, audio, video that are
used together in the same application) security techniques[1-11]. It provides the state- of- arts technologies in the multime-
dia security areas. Digital watermarking is based on the science of steganography or data hiding [12,13]. Steganography
comes from Greek meaning ‘covered writing’. It is an area of research for communicating in a hidden manner. The
technique of chaos is also applicable in watermarking [14-16].
Koch et al [17] introduced the first efficient watermarking. In their method, the image is first divided into square
blocks of size 8 x 8 for DCT computation. A pair of mid-Frequency coefficients is chosen for modification from 12
pre-determined pairs.
Bors and Pitas [18] developed a mode that modifies the DCT coefficients satisfying a block site selection constraint.
After dividing the image into blocks of size 8x8, certain blocks are selected based on a Gaussian network classifier
decision. The middle range frequency DCT coefficients are then modified using either a linear DCT constraint or a
circular DCT detection region. Cox, et al [19] developed the first frequency domain-watermarking scheme. Other works
on watermarking via DCT are found by Suhail et al [20] and Nick Kingbury [21] used the two-dimensional DCT defined
by the expression
𝑔(𝑥, 𝑦, 0, 0) = 1/𝑁
𝑔(𝑥, 𝑦, 𝑢, 𝑣)= 1
2
𝑁3
[cos(2𝑥 + 1)𝑢𝜋] [cos(2𝑦 + 1)𝑣𝜋]
𝑓𝑜𝑟𝑥, 𝑦 = 0, 1, . . . , 𝑁 − 1
𝑢, 𝑣 = 1, 2, . . . , 𝑁 − 1
∗Corresponding author. E-mail address: njahabdul@yahoo.com
Copyright c
⃝World Academic Press, World Academic Union
IJNS.2010.06.15/360
M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 359
The DCT scheme relies on some ideas proposed by Cox et al [19] where they proposed a watermark that consists of
a sequence of randomly generated real numbers. These numbers have a normal distribution with zero mean and unity
variance. Watermarking is carried out by modifying the DCT coefficient ( C𝑖, i = 1...N ) of the image using the DCT
coefficients ( W𝑖, i = 1... N ) of the watermarking to obtain the DCT coefficients ( C’𝑖, i = 1...N ) of the watermarked
image according to the equation
𝐶𝑖′ = 𝐶𝑖 + 𝛼𝐶𝑖𝑊𝑖
𝑖 = 1, 2, . . . , 𝑁, 𝛼 = 0.1
If the original image can be defined by Io and the watermarked image possibly distorted image I*w, then a possible
corrupted watermark w* can be extracted. Reversing the embedding procedure can do this extracting. This is done using
inverse DCT. Suhail et al, [20] did not watermark the whole image. They embedded the watermark in sub-images of the
image. So the N x M image is subdivided into pixels of size 16 x 16 (256 pixels). The DCT of the block is then computed.
After that the DCT coefficients are reordered into zig-zag scan.
Juan R et al [22] analyzed the DCT and applied to a block of 8 x 8 pixels as in the JPEG algorithms. The main goal was
to present a novel analyzed framework that allow for the assessment of the performance of a given watermarking method
in the DCT domain. They were able to discover new detector/decoder structure that outperforms the existing ones, usually
based on calculating the correlation coefficient between the image and the watermark. Chaw-Sang et al [23] performed
factor analysis of wavelet based on watermarked methods.
The aim of this paper is to determine the effect of block sizes (i.e. 2 x 2, 4 x 4, 8 x 8, 16 x 16, 32 x 32 and 64 x 64
) used in watermarking of digital images, on various attributes (robustness, capacity, time of watermarking, visibility and
distortion ) of the watermarked image. The step size or quantization step is a parameter that can be changed to set the final
quality of the image. The greater the step size the greater the compression. A block is an N x N matrix that can represent
either luminance or the corresponding DCT coefficients.
The rest of the work is as follows: section 2 deals with the theory of DCT. Section 3 deals with effects of block sizes
on the attributes of watermarked image. Section 4 states the experimental results and section 5 concludes the paper.
2 Theory of Discrete Cosine Transform (DCT)
Ahmed, Natarajan, and Rao developed discrete cosine transform in 1974 [25]. It is a close relative of discrete fourier
transform (DFT). DCT is a technique for converting a signal into elementary frequency components [26, 27]. Figure 1
shows the DCT transformation function from spatial to frequency domain.
Among the three types of transform domain, the classic and still most popular domain for image processing is that of
the Discrete-Cosine-Transform or DCT. The image is split into 8 x 8 (pixels) block. Each block is used to encode one
signature bit in a pseudorandom manner. Image is thus broken up into various different frequency bands in DCT method,
allowing watermarking data to be embedded easily into the middle frequency bands of the image. The reason why the
middle bands are carefully selected is to avoid the exposure of the important parts of the images to removal through
compression and noise attacks.
The DCT transformation function from Spatial to frequency domain is given by
𝐹 (𝑢, 𝑣) = Λ(𝑢)Λ(𝑣)
4
7
∑
𝑖=0
7
∑
𝑗=0
cos (2𝑖+1)⋅𝑢𝜋
16 cos (2𝑗+1)⋅𝑣𝜋
16 ⋅ 𝑓 (𝑖, 𝑗)
Λ (𝜉) =
{
1 /
√
2, 𝑓𝑜𝑟 𝜉 = 0
1, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
where 𝜉 = u and v. f(i,j) (intensity of pixels in row i and column j) and F(u,v) are the transform coefficients.
2.1 Types of discrete cosine transform (DCT)
2.1.1 The one-dimensional DCT
The most common DCT definition of a 1-Dimensional sequence of length N is the forward transform as:
𝑦(𝑘) =
𝑁
∑
𝑖=1
𝑤(𝑖)𝑥(𝑖) cos
𝜋(2𝑖 − 1)(𝑘 − 1)
2𝑁
, 𝑘 = 1, ⋅ ⋅ ⋅ , 𝑁
IJNS homepage: http://www.nonlinearscience.org.uk/
360 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366
Figure 1: DCT transformation functions from Spatial to Frequency Domain
where as is shown in figure 1 above is given by
𝑤(𝑖) =
⎧



⎨



⎩
1
√
𝑁
, 𝑖 = 1
√
2
𝑁 , 2 ≤ 𝑖 ≤ 𝑁
The inverse discrete cosine transform reconstructs a sequence from its discrete cosine transform (DCT) coefficients.
𝑥(𝑖) =
𝑁
∑
𝑘=1
𝑤(𝑘)𝑦(𝑘) cos 𝜋 (2𝑖−1)(𝑘−1)
2𝑁 , 𝑖 = 1, ⋅ ⋅ ⋅ , 𝑁 where
𝑤(𝑘) =
⎧



⎨



⎩
1
√
𝑁
, 𝑘 = 1
√
2
𝑁 , 2 ≤ 𝑘 ≤ 𝑁
Thus, the first transform coefficient is the average value of the sample sequence. In literature, this value is referred to as
the DC Coefficient. All other transform coefficients are called the AC Coefficient𝑠.DC and AC are borrowed from Direct
Current and Alternating Current in electricity.
2.1.2 The two-dimensional DCT
The 2-Dimensional DCT is a direct extension of the 1-Dimensional case .It is a separable, linear transformation; that is,
the two-dimensional transform is equivalent to a one-dimensional DCT performed along a single dimension followed by
a one-dimensional DCT in the other dimension. The definition of the two-dimensional DCT for an input image A and
output image B is [20, 21].
𝐵𝑝𝑞 = 𝛼𝑝𝛼𝑞
𝑀−1
∑
𝑚=0
𝑁−1
∑
𝑛=0
𝐴𝑚𝑛 cos 𝜋(2𝑚+1)𝑝
2𝑀 cos 𝜋(2𝑛+1)𝑞
2𝑁
0 ≤ 𝑝 ≤ 𝑀 − 1
0 ≤ 𝑞 ≤ 𝑁 − 1
IJNS email for contribution: editor@nonlinearscience.org.uk
M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 361
𝛼𝑝 =
⎧



⎨



⎩
1
√
𝑀
, 𝑝 = 0
√
2
𝑀 , 1 ≤ 𝑝 ≤ 𝑀 − 1
𝛼𝑞 =
⎧



⎨



⎩
1
√
𝑁
, 𝑞 = 0
√
2
𝑁 , 1 ≤ 𝑞 ≤ 𝑁 − 1
where 𝑀 and 𝑁 are the row and column size of A, respectively. If you apply the DCT to real data, the result is also real.
The DCT tends to concentrate information, making it useful for image compression applications.
This transform can be inverted using the two-dimensional inverse DCT transform:
𝐴𝑚𝑛 = 𝛼𝑝𝛼𝑞
𝑀−1
∑
𝑝=0
𝑁−1
∑
𝑞=0
𝛼𝑝𝛼𝑞𝐵𝑝𝑞 cos 𝜋(2𝑚+1)𝑝
2𝑀 cos 𝜋(2𝑛+1)𝑞
2𝑁
0 ≤ 𝑚 ≤ 𝑀 − 1
0 ≤ 𝑛 ≤ 𝑁 − 1
𝛼𝑝 =
⎧



⎨



⎩
1
√
𝑀
, 𝑝 = 0
√
2
𝑀 , 1 ≤ 𝑝 ≤ 𝑀 − 1
𝛼𝑞 =
⎧



⎨



⎩
1
√
𝑁
, 𝑞 = 0
√
2
𝑁 , 1 ≤ 𝑞 ≤ 𝑁 − 1
3 Effect of block sizes on attributes of watermarked image
3.1 Watermark attributes
The technique used for watermarking in this paper is Discrete Cosine Transform (DCT). The DCT function transforms
spatial domain data to frequency domain. The image is split into various blocks and the attributes of watermarked image
is compared based on the block sizes used.
The host image and the watermark are combined by the equation.
𝐶′
𝑖𝑗(𝑛) = 𝛼𝑛𝐶𝑖𝑗(𝑛) + 𝛽𝑛𝑊𝑖𝑗(𝑛)
𝑛 = 1, 2 . . . .
𝛼𝑛 and 𝛽𝑛 coefficients are for block n. C𝑖𝑗 (n) are the DCT coefficient of the host image block and W𝑖𝑗(n) the DCT
coefficient of the watermarked image block. 𝛼𝑛 is the scaling factor and 𝛽𝑛 is the embedding factor. 𝛼𝑛=1 and 𝛽𝑛 = 1
2𝑛
where n represents the value of block size and ranges from 1 to 6. The effect of block sizes is investigated from the various
attributes of watermarked image.
3.1.1 Channel capacity.
The channel capacity, which is an upper bound on the rate at which communication reliably occurs, is given by
𝐶 = 𝑊 log2 (1 + 𝑆/𝑁)
or
𝐶 =
1
2
log2 (1 + 𝑆/𝑁) .
Jim Chou et al (2001). W= bandwidth given in units of pixel –1
. Channel capacity has unit of bits per pixel.
3.1.2 Imperceptibility
The signal to noise ratio (SNR) is a rough estimate of perceptibility. The higher is the SNR the more visible the modulated
carriers. Mathematical matrix such as (Mean Square Error (MSE) and visual analysis of watermarked image can also be
used.
IJNS homepage: http://www.nonlinearscience.org.uk/
362 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366
3.1.3 Robustness
Peak signal-to -noise ratio (PSNR) is to quantify distortion due to watermarking.
𝑃𝑆𝑁𝑅 = 10 log10
(
2562
𝑀𝑆𝐸
)
3.1.4 Distortion
The method used for measuring distortion caused in the watermarked image is the mean square error (MSE). The signal
to noise ratio can also be used for measuring distortion in digital images. The MSE is given by the equation below:
𝑀𝑆𝐸 =
1
𝑀𝑁
𝑀
∑
𝑖=1
𝑁
∑
𝑖=1
((𝑃𝑖𝑗 − 𝑃′
𝑖𝑗))
2
M= number of component colours, N= number of pixels, P𝑖𝑗 = original image , P’𝑖𝑗 = watermarked image. The SNR can
be used as a measure for distortion of images. The larger is the SNR the better the quality of the image.
The SNR is related to MSE by the equation:
𝑆𝑁𝑅 =
10 log
𝑀
∑
𝑖=1
𝑁
∑
𝑗=1
((
𝐼
′
𝑖𝑗
))
𝑀𝑁 ⋅ 𝐸𝑚𝑠
2
𝑒𝑖𝑗 = 𝐼𝑖𝑗 − 𝐼′
𝑖𝑗
𝑀𝑆𝐸 = 𝐸𝑚𝑠 =
1
𝑀𝑁
𝑀
∑
𝑖=1
𝑁
∑
𝑖=1
𝑒𝑥𝑦
2
3.2 Implementation
To achieve the objectives of this work the following will be carried out:
∙ Transform the original image and watermark image into blocks
∙ DCT coefficients for each block of original image are found out.
∙ Insert 𝛼𝑛 and 𝛽𝑛 for combining the images
∙ DCT for the watermark image blocks are found out.
∙ The final watermarked image is modified according the result above by adding the original image to the watermark
image.
∙ Perform distortion test on watermarked image.
∙ Perform robustness test on watermarked image.
∙ Perform capacity test on watermarked image.
∙ Compare the results obtained.
4 Experimental results
4.1 Images used
The images used for the watermarking is the logo of Federal University of Agriculture, Abeokuta, Nigeria, as shown in
Figure 2 and the image “LENA” popularly used for image processing, downloaded from the Internet as shown in Figure
3.
IJNS email for contribution: editor@nonlinearscience.org.uk
M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 363
Figure 2: UNAAB logo. Figure 3: Lena Image.
A visible watermarked image is shown in Figure 4 for key = 2 while Figure 5 shows an invisible watermarking at key
=16.
Figure 4: Visible watermarking. Figure 5: Invisible watermarking.
4.2 Results and Discussion
The functions of robustness, channel capacity and distortion were coded in MATLAB 7.1. The results from the program
were based on various effects of block sizes on time, capacity, robustness, distortion and imperceptibility of the water-
marked image after subjecting the watermarked image to various tests according to their block sizes. Table 1 summarizes
the results of the above attributes. Looking at Table 1, the DCT time is very high at block size 2 x 2 with 7.31s and
gradually reduces to 5.160 at block size 4 x 4 and 0.616s at block size 64 x 64.
For the attribute of robustness, the percentage signal-to-noise ratio is very low at block size 2 x 2 with 62.063 db and
gradually increases to 65.490(block size 4 x 4), 68.731(block size 8 x 8), 69.996(block size 16 x 16),70.904(block size 32
x32 ) and 70.989 (block size 64 x 64). The attribute of capacity gradually increases as the block size increases as depicted
in Table 1.
Every communication channel suffers from distortion. Therefore, hiding a watermark in an image will introduce some
measures of distortion in the original image. Distortion in this study showed that the values vary significantly with block
sizes together with the step size as illustrated in Table 2. For example, at block size 2 x 2 with steps 2, 4, 8, 16, 32 and
64, distortion values are 0.3629, 4.0646, 1.2178, 13.2961, 39.999, and 132.5639. Figure 6 shows the distortion values of
block sizes (2 x 2, 4 x 4, 8 x 8, 16 x 16, 32 x 32 and 64 x 64) as against step 2. The same fluctuations are noticed for other
distortion values of block sizes as against their step sizes. Moreso, values of distortion in various step sizes as against a
particular block size are also noted as illustrated in table 2 with their fluctuation as shown in figure 6.
IJNS homepage: http://www.nonlinearscience.org.uk/
364 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366
The block size used for watermarking is independent of the imperceptibility of the watermark. The embedded image
introduced distortions into the original image and does not control the imperceptibility of the watermark. The impercep-
tibility depends on the embedding factor, 𝛽 of the watermark. The perceptibility of watermark reduces as the key used (
2, 4, 8, 16, 32, 64, etc ) which corresponds to block sizes (2 x 2, 4 x 4, 8 x 8, 16 x 16, 32 x 32, 64 x 64, etc ) increases.
For example, the watermark is visible with keys 2, 4, and 8 but not visible with keys 16, 32, and 64 as shown in table 1.
At key 16 which corresponds to block size 16 x 16, the watermarked image still looks like the original image despite the
hidden watermark.
Table 1: The summary of the various attributes values.
Key Block Size Robustness Time Visibility Capacity
2 2x2 62.063 7.318 Visible 31.532
4 4x4 65.490 5.160 Visible 33.245
8 8x8 68.731 1.760 Visible 34.865
16 16x16 69.996 0.880 Not visible 35.455
32 32x32 70.904 0.716 Not visible 35.952
64 64 x 64 70.989 0.616 Not visible 35.966
Table 2: Summary of Block size with Distortion values in different step Sizes.
Block size Distortion
Step=2
Distortion
Step=4
Distortion
Step=8
Distortion
Step=16
Distortion
Step=32
Distortion
Step=64
2 x 2 0.3629 4.0646 1.2178 13.2961 39.9999 132.5639
4 x 4 0.3051 3.3734 1.0026 10.5401 30.5552 79.7364
8 x 8 0.2721 2.1697 0.6867 7.4734 27.6999 72.1493
16 x 16 0.3007 3.1966 0.9945 10.4414 29.1143 72.9128
32 x32 0.3177 3.8375 1.1307 12.0094 33.2575 81.4464
64 x 64 0.3302 4.4939 1.2562 14.3236 39.4926 93.7040
Step=2
DT = 0.3629 0.3051 0.2721 0.3007 0.3177 0.3302
DT= distortion.
5 Conclusion
This work has applied discrete cosine transform (DCT) to achieve visible and invisible watermarking of a digital image
against piracy. The work has also investigated the effect of block size and step size on the attributes of the watermarked
image. It was found that the time for watermarking reduces as block size increases, capacity and robustness increase
with block size. Distortion fluctuated below block size 8 x 8 but gradually increases above the block size. Above 8 x 8
the watermark is invisible and block size 16 x 16 can serve as a means of checking piracy of digital images because the
watermarked image produced resembles the original image despite the fact that it contains a hidden watermark.
References
[1] Allan MB: A review of digital watermarking. Department of Engineering, University of Aberdeen. (2001).
[2] Embry A: Influence of DCT on coding efficiency. University of Stanford, USA, EE368B. (2000).
[3] Janahan C: Digital image watermarking - An overview.Indian Institute of Information Technology, India.(2000).
[4] Chou J: New generation technique for robust and imperceptible audio data hiding.
IJNS email for contribution: editor@nonlinearscience.org.uk
M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 365
Figure 6: Distortion values of various block sizes with step size 2.
[5] Zhang Z, Zhu Z, Xi L: Novel scheme for watermarking stereo video. International Journal of Nonlinear Science.
3:(2007),74-80.
[6] Kan H: Adaptive visible watermarking for images. Appeared in Proc of ICMCS 99, Florence, Italy. (1999).
[7] Wong P: Protecting digital media content. ACM. 41:(1999),35-43 .
[8] Barni M, Bartolini F, Checcacci: Watermarking of MPEG-4 video objects. IEEE Transactions on Multimedia.
7:(2005),23-32.
[9] Cayre F, Fontaine C, Furon T: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing.
53:(2005),3976-3987.
[10] Mobasseri BG, Berger RJ: A foundation for watermarking in compressed domain. IEEE Signal Processing Letters.
12:(2005),399-402.
[11] Lei CL, Yu PL, Tsa PL, Chan MH: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transac-
tions on Signal Processing. 13:(2004),1618-1626.
[12] Joshua RS: Modulation and information hiding in image: Published in Proceeding of first information hiding work-
shop.Isaac Newton Institute, Cambridge. (1996).
[13] Marnel LM, Boncelet CG, Retter CT: Spread spectrum image steganography. IEEE Transactions on Signal Process-
ing. 6:(1999),1075-1083.
[14] Sun M, Tian L, Yin J: Hopf bifurcation analysis of the energy resource chaotic system. International Journal of
Nonlinear Science. 1:(2006),49-53.
[15] Cai G, Huang J, Tian L, Wang Q: Adaptive control and slow manifold analysis of a new chaotic system. International
Journal of Nonlinear Science. 2:(2006),50-60.
[16] Wang X, Tian L, Yu L: Linear feedback controlling and synchronization of the Chen’s chaotic system. International
Journal of Nonlinear Science. 2:(2006),43-49.
[17] Idowu BA, Vincent UE, Njah AN: Control and synchronization of chaos in nonlinear gyros via backstepping design.
Internatinal Journal of Nonlinear Science. 5:(2008),11-19.
[18] Njah AN, Vincent UE: Synchronization and anti-synchronization of chaos in an extended Bonhöffer-van der Pol
oscillator using active control. Journal of Sound and Vibration. 319:(2009),41-49.
[19] Njah AN, Ojo KS: Synchronization via backstepping nonlinear control of externally excited Φ6
van der Pol and Φ6
Duffing oscillators. Far East Journal of Dynamical Systems. 11:(2009),41-49.
[20] Koch E, Zhao J: Towards robust and hidden image copyright labeling. In Proceeding of IEEE Nonlinear Signal
Processing Workshop. pp (1995), 452-455.
[21] Bors A, Pitas I: Image watermarking using DCT domain constraints. In Conference IEEE Image Processing, Lau-
sanne, Switzerland. (1996) ,231-234.
[22] Cox I, Kilian J, Leighton FT, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Transaction
on Image Processing. 6:(1997),1673-1687.
IJNS homepage: http://www.nonlinearscience.org.uk/
366 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366
[23] Suhail MA: Simulation study of digital watermarking in JPEG 2000 schemes. IEEE Transaction on Watermarking.
(2001).
[24] Kingbury N: 2-dimensional discrete cosine transform. Connexious. (2005).
[25] Juan RH: Statistical analysis of watermarking schemes for copyright protection of image. IEEE. (1999).
[26] Seng C: Perfomance factor analysis of wavelet based watermarking methods. IEEE. (2005).
[27] Natarajan NT, Rao KR: On image processing and a discrete cosine transform. IEEE Transaction on Computer C-23
(1974).
[28] Tao B, Dikson B: Adaptive watermarking in DCT domain. International Conference on Acoustics Speech and Signal
Processing. ICASSP (1997).
[29] Saraju PM: A discrete cosine transform domain visible watermarking for images. Department of Computer Sciences
and Engineering, University of South Florida, F.I 33620, USA (2000).
[30] Seyd A: The discrete cosine transform theory and application.Department of Electrical and Computer Engineering,
Michigan State University. (2003).
IJNS email for contribution: editor@nonlinearscience.org.uk

More Related Content

What's hot

SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURESEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATUREacijjournal
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesIDES Editor
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsIJORCS
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCijsrd.com
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compressionAlexander Decker
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compressionAlexander Decker
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...
Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...
Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...CSCJournals
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...TELKOMNIKA JOURNAL
 
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESGREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESijcseit
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression IJECEIAES
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...IRJET Journal
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 

What's hot (19)

SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURESEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression Algorithms
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTC
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...
Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...
Performance Comparison of Image Retrieval Using Fractional Coefficients of Tr...
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...
 
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESGREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
 
1820 1824
1820 18241820 1824
1820 1824
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 

Similar to Effect of Block Sizes on the Attributes of Watermarking Digital Images

PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...VLSICS Design
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...VLSICS Design
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesCSCJournals
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compressionAlexander Decker
 
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMSA COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMSKate Campbell
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTIJSRD
 
Comparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical ImagesComparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical ImagesIRJET Journal
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...IOSR Journals
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodIAEME Publication
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition IJECEIAES
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Journals
 

Similar to Effect of Block Sizes on the Attributes of Watermarking Digital Images (20)

PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
Ceis 4
Ceis 4Ceis 4
Ceis 4
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression
 
1820 1824
1820 18241820 1824
1820 1824
 
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMSA COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWT
 
Comparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical ImagesComparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical Images
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
 
I017125357
I017125357I017125357
I017125357
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 

More from Dr. Michael Agbaje

Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICA REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICDr. Michael Agbaje
 
Agbaje7survey of softwar process
Agbaje7survey of softwar processAgbaje7survey of softwar process
Agbaje7survey of softwar processDr. Michael Agbaje
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
Model based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursModel based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursDr. Michael Agbaje
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONDr. Michael Agbaje
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureDr. Michael Agbaje
 
Broadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsBroadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsDr. Michael Agbaje
 
A 3-dimensional motion sensor and tracking system using vector analysis method
A 3-dimensional  motion sensor and tracking system using vector  analysis methodA 3-dimensional  motion sensor and tracking system using vector  analysis method
A 3-dimensional motion sensor and tracking system using vector analysis methodDr. Michael Agbaje
 
Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Dr. Michael Agbaje
 

More from Dr. Michael Agbaje (10)

Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICA REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
 
Agbaje7survey of softwar process
Agbaje7survey of softwar processAgbaje7survey of softwar process
Agbaje7survey of softwar process
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
Model based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursModel based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumours
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
Broadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsBroadcast Monitoring and Applications
Broadcast Monitoring and Applications
 
A 3-dimensional motion sensor and tracking system using vector analysis method
A 3-dimensional  motion sensor and tracking system using vector  analysis methodA 3-dimensional  motion sensor and tracking system using vector  analysis method
A 3-dimensional motion sensor and tracking system using vector analysis method
 
Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Effect of Block Sizes on the Attributes of Watermarking Digital Images

  • 1. ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.9(2010) No.3,pp.358-366 Effect of Block Sizes on the Attributes of Watermarking Digital Images M. O. Agbaje 1 , A. T. Akinwale1 , O. Folorunso 1 , A. N. Njah 2 ∗ 1 Department of Computer Science, University of Agriculture, Abeokuta, Nigeria. 2 Department of Physics, University of Agriculture, Abeokuta, Nigeria. (Received 22 July 2008, accepted 11 March 2009) Abstract: This work examines the effect of block sizes on attributes (robustness, capacity, time of water- marking, visibility and distortion ) of watermarked digital images using Discrete Cosine Transform (DCT) function. The DCT function breaks up the image into various frequency bands and allows watermark data to be easily embedded. The advantage of this transformation is the ability to pack input image data into a few coefficients. The block size 8 x 8 is commonly used in watermarking. The work investigates the ef- fect of using block sizes below and above 8 x 8 on the attributes of watermark. The attributes of robustness and capacity increase as the block size increases (62-70db, 31.5-35.9 bit /pixel). The time for watermarking reduces as the block size increases. The watermark is still visible for block sizes below 8 x 8 but invisible for those above it. Distortion decreases sharply from a high value at 2 x 2 block size to minimum at 8 x 8 and gradually increases with block size. The overall observation indicates that watermarked image gradually reduces in quality due to fading above 8 x 8 block size. For easy detection of image against piracy the block size 16 x 16 gives the best output result because it closely resembles the original image in terms of visual quality displayed despite the fact that it contains a hidden watermark. Keywords: discrete cosine transform; watermark attributes; multimedia; block sizes 1 Introduction Watermarking is one of the multimedia (multiple form of media- text, graphics, images, animation, audio, video that are used together in the same application) security techniques[1-11]. It provides the state- of- arts technologies in the multime- dia security areas. Digital watermarking is based on the science of steganography or data hiding [12,13]. Steganography comes from Greek meaning ‘covered writing’. It is an area of research for communicating in a hidden manner. The technique of chaos is also applicable in watermarking [14-16]. Koch et al [17] introduced the first efficient watermarking. In their method, the image is first divided into square blocks of size 8 x 8 for DCT computation. A pair of mid-Frequency coefficients is chosen for modification from 12 pre-determined pairs. Bors and Pitas [18] developed a mode that modifies the DCT coefficients satisfying a block site selection constraint. After dividing the image into blocks of size 8x8, certain blocks are selected based on a Gaussian network classifier decision. The middle range frequency DCT coefficients are then modified using either a linear DCT constraint or a circular DCT detection region. Cox, et al [19] developed the first frequency domain-watermarking scheme. Other works on watermarking via DCT are found by Suhail et al [20] and Nick Kingbury [21] used the two-dimensional DCT defined by the expression 𝑔(𝑥, 𝑦, 0, 0) = 1/𝑁 𝑔(𝑥, 𝑦, 𝑢, 𝑣)= 1 2 𝑁3 [cos(2𝑥 + 1)𝑢𝜋] [cos(2𝑦 + 1)𝑣𝜋] 𝑓𝑜𝑟𝑥, 𝑦 = 0, 1, . . . , 𝑁 − 1 𝑢, 𝑣 = 1, 2, . . . , 𝑁 − 1 ∗Corresponding author. E-mail address: njahabdul@yahoo.com Copyright c ⃝World Academic Press, World Academic Union IJNS.2010.06.15/360
  • 2. M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 359 The DCT scheme relies on some ideas proposed by Cox et al [19] where they proposed a watermark that consists of a sequence of randomly generated real numbers. These numbers have a normal distribution with zero mean and unity variance. Watermarking is carried out by modifying the DCT coefficient ( C𝑖, i = 1...N ) of the image using the DCT coefficients ( W𝑖, i = 1... N ) of the watermarking to obtain the DCT coefficients ( C’𝑖, i = 1...N ) of the watermarked image according to the equation 𝐶𝑖′ = 𝐶𝑖 + 𝛼𝐶𝑖𝑊𝑖 𝑖 = 1, 2, . . . , 𝑁, 𝛼 = 0.1 If the original image can be defined by Io and the watermarked image possibly distorted image I*w, then a possible corrupted watermark w* can be extracted. Reversing the embedding procedure can do this extracting. This is done using inverse DCT. Suhail et al, [20] did not watermark the whole image. They embedded the watermark in sub-images of the image. So the N x M image is subdivided into pixels of size 16 x 16 (256 pixels). The DCT of the block is then computed. After that the DCT coefficients are reordered into zig-zag scan. Juan R et al [22] analyzed the DCT and applied to a block of 8 x 8 pixels as in the JPEG algorithms. The main goal was to present a novel analyzed framework that allow for the assessment of the performance of a given watermarking method in the DCT domain. They were able to discover new detector/decoder structure that outperforms the existing ones, usually based on calculating the correlation coefficient between the image and the watermark. Chaw-Sang et al [23] performed factor analysis of wavelet based on watermarked methods. The aim of this paper is to determine the effect of block sizes (i.e. 2 x 2, 4 x 4, 8 x 8, 16 x 16, 32 x 32 and 64 x 64 ) used in watermarking of digital images, on various attributes (robustness, capacity, time of watermarking, visibility and distortion ) of the watermarked image. The step size or quantization step is a parameter that can be changed to set the final quality of the image. The greater the step size the greater the compression. A block is an N x N matrix that can represent either luminance or the corresponding DCT coefficients. The rest of the work is as follows: section 2 deals with the theory of DCT. Section 3 deals with effects of block sizes on the attributes of watermarked image. Section 4 states the experimental results and section 5 concludes the paper. 2 Theory of Discrete Cosine Transform (DCT) Ahmed, Natarajan, and Rao developed discrete cosine transform in 1974 [25]. It is a close relative of discrete fourier transform (DFT). DCT is a technique for converting a signal into elementary frequency components [26, 27]. Figure 1 shows the DCT transformation function from spatial to frequency domain. Among the three types of transform domain, the classic and still most popular domain for image processing is that of the Discrete-Cosine-Transform or DCT. The image is split into 8 x 8 (pixels) block. Each block is used to encode one signature bit in a pseudorandom manner. Image is thus broken up into various different frequency bands in DCT method, allowing watermarking data to be embedded easily into the middle frequency bands of the image. The reason why the middle bands are carefully selected is to avoid the exposure of the important parts of the images to removal through compression and noise attacks. The DCT transformation function from Spatial to frequency domain is given by 𝐹 (𝑢, 𝑣) = Λ(𝑢)Λ(𝑣) 4 7 ∑ 𝑖=0 7 ∑ 𝑗=0 cos (2𝑖+1)⋅𝑢𝜋 16 cos (2𝑗+1)⋅𝑣𝜋 16 ⋅ 𝑓 (𝑖, 𝑗) Λ (𝜉) = { 1 / √ 2, 𝑓𝑜𝑟 𝜉 = 0 1, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 where 𝜉 = u and v. f(i,j) (intensity of pixels in row i and column j) and F(u,v) are the transform coefficients. 2.1 Types of discrete cosine transform (DCT) 2.1.1 The one-dimensional DCT The most common DCT definition of a 1-Dimensional sequence of length N is the forward transform as: 𝑦(𝑘) = 𝑁 ∑ 𝑖=1 𝑤(𝑖)𝑥(𝑖) cos 𝜋(2𝑖 − 1)(𝑘 − 1) 2𝑁 , 𝑘 = 1, ⋅ ⋅ ⋅ , 𝑁 IJNS homepage: http://www.nonlinearscience.org.uk/
  • 3. 360 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366 Figure 1: DCT transformation functions from Spatial to Frequency Domain where as is shown in figure 1 above is given by 𝑤(𝑖) = ⎧    ⎨    ⎩ 1 √ 𝑁 , 𝑖 = 1 √ 2 𝑁 , 2 ≤ 𝑖 ≤ 𝑁 The inverse discrete cosine transform reconstructs a sequence from its discrete cosine transform (DCT) coefficients. 𝑥(𝑖) = 𝑁 ∑ 𝑘=1 𝑤(𝑘)𝑦(𝑘) cos 𝜋 (2𝑖−1)(𝑘−1) 2𝑁 , 𝑖 = 1, ⋅ ⋅ ⋅ , 𝑁 where 𝑤(𝑘) = ⎧    ⎨    ⎩ 1 √ 𝑁 , 𝑘 = 1 √ 2 𝑁 , 2 ≤ 𝑘 ≤ 𝑁 Thus, the first transform coefficient is the average value of the sample sequence. In literature, this value is referred to as the DC Coefficient. All other transform coefficients are called the AC Coefficient𝑠.DC and AC are borrowed from Direct Current and Alternating Current in electricity. 2.1.2 The two-dimensional DCT The 2-Dimensional DCT is a direct extension of the 1-Dimensional case .It is a separable, linear transformation; that is, the two-dimensional transform is equivalent to a one-dimensional DCT performed along a single dimension followed by a one-dimensional DCT in the other dimension. The definition of the two-dimensional DCT for an input image A and output image B is [20, 21]. 𝐵𝑝𝑞 = 𝛼𝑝𝛼𝑞 𝑀−1 ∑ 𝑚=0 𝑁−1 ∑ 𝑛=0 𝐴𝑚𝑛 cos 𝜋(2𝑚+1)𝑝 2𝑀 cos 𝜋(2𝑛+1)𝑞 2𝑁 0 ≤ 𝑝 ≤ 𝑀 − 1 0 ≤ 𝑞 ≤ 𝑁 − 1 IJNS email for contribution: editor@nonlinearscience.org.uk
  • 4. M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 361 𝛼𝑝 = ⎧    ⎨    ⎩ 1 √ 𝑀 , 𝑝 = 0 √ 2 𝑀 , 1 ≤ 𝑝 ≤ 𝑀 − 1 𝛼𝑞 = ⎧    ⎨    ⎩ 1 √ 𝑁 , 𝑞 = 0 √ 2 𝑁 , 1 ≤ 𝑞 ≤ 𝑁 − 1 where 𝑀 and 𝑁 are the row and column size of A, respectively. If you apply the DCT to real data, the result is also real. The DCT tends to concentrate information, making it useful for image compression applications. This transform can be inverted using the two-dimensional inverse DCT transform: 𝐴𝑚𝑛 = 𝛼𝑝𝛼𝑞 𝑀−1 ∑ 𝑝=0 𝑁−1 ∑ 𝑞=0 𝛼𝑝𝛼𝑞𝐵𝑝𝑞 cos 𝜋(2𝑚+1)𝑝 2𝑀 cos 𝜋(2𝑛+1)𝑞 2𝑁 0 ≤ 𝑚 ≤ 𝑀 − 1 0 ≤ 𝑛 ≤ 𝑁 − 1 𝛼𝑝 = ⎧    ⎨    ⎩ 1 √ 𝑀 , 𝑝 = 0 √ 2 𝑀 , 1 ≤ 𝑝 ≤ 𝑀 − 1 𝛼𝑞 = ⎧    ⎨    ⎩ 1 √ 𝑁 , 𝑞 = 0 √ 2 𝑁 , 1 ≤ 𝑞 ≤ 𝑁 − 1 3 Effect of block sizes on attributes of watermarked image 3.1 Watermark attributes The technique used for watermarking in this paper is Discrete Cosine Transform (DCT). The DCT function transforms spatial domain data to frequency domain. The image is split into various blocks and the attributes of watermarked image is compared based on the block sizes used. The host image and the watermark are combined by the equation. 𝐶′ 𝑖𝑗(𝑛) = 𝛼𝑛𝐶𝑖𝑗(𝑛) + 𝛽𝑛𝑊𝑖𝑗(𝑛) 𝑛 = 1, 2 . . . . 𝛼𝑛 and 𝛽𝑛 coefficients are for block n. C𝑖𝑗 (n) are the DCT coefficient of the host image block and W𝑖𝑗(n) the DCT coefficient of the watermarked image block. 𝛼𝑛 is the scaling factor and 𝛽𝑛 is the embedding factor. 𝛼𝑛=1 and 𝛽𝑛 = 1 2𝑛 where n represents the value of block size and ranges from 1 to 6. The effect of block sizes is investigated from the various attributes of watermarked image. 3.1.1 Channel capacity. The channel capacity, which is an upper bound on the rate at which communication reliably occurs, is given by 𝐶 = 𝑊 log2 (1 + 𝑆/𝑁) or 𝐶 = 1 2 log2 (1 + 𝑆/𝑁) . Jim Chou et al (2001). W= bandwidth given in units of pixel –1 . Channel capacity has unit of bits per pixel. 3.1.2 Imperceptibility The signal to noise ratio (SNR) is a rough estimate of perceptibility. The higher is the SNR the more visible the modulated carriers. Mathematical matrix such as (Mean Square Error (MSE) and visual analysis of watermarked image can also be used. IJNS homepage: http://www.nonlinearscience.org.uk/
  • 5. 362 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366 3.1.3 Robustness Peak signal-to -noise ratio (PSNR) is to quantify distortion due to watermarking. 𝑃𝑆𝑁𝑅 = 10 log10 ( 2562 𝑀𝑆𝐸 ) 3.1.4 Distortion The method used for measuring distortion caused in the watermarked image is the mean square error (MSE). The signal to noise ratio can also be used for measuring distortion in digital images. The MSE is given by the equation below: 𝑀𝑆𝐸 = 1 𝑀𝑁 𝑀 ∑ 𝑖=1 𝑁 ∑ 𝑖=1 ((𝑃𝑖𝑗 − 𝑃′ 𝑖𝑗)) 2 M= number of component colours, N= number of pixels, P𝑖𝑗 = original image , P’𝑖𝑗 = watermarked image. The SNR can be used as a measure for distortion of images. The larger is the SNR the better the quality of the image. The SNR is related to MSE by the equation: 𝑆𝑁𝑅 = 10 log 𝑀 ∑ 𝑖=1 𝑁 ∑ 𝑗=1 (( 𝐼 ′ 𝑖𝑗 )) 𝑀𝑁 ⋅ 𝐸𝑚𝑠 2 𝑒𝑖𝑗 = 𝐼𝑖𝑗 − 𝐼′ 𝑖𝑗 𝑀𝑆𝐸 = 𝐸𝑚𝑠 = 1 𝑀𝑁 𝑀 ∑ 𝑖=1 𝑁 ∑ 𝑖=1 𝑒𝑥𝑦 2 3.2 Implementation To achieve the objectives of this work the following will be carried out: ∙ Transform the original image and watermark image into blocks ∙ DCT coefficients for each block of original image are found out. ∙ Insert 𝛼𝑛 and 𝛽𝑛 for combining the images ∙ DCT for the watermark image blocks are found out. ∙ The final watermarked image is modified according the result above by adding the original image to the watermark image. ∙ Perform distortion test on watermarked image. ∙ Perform robustness test on watermarked image. ∙ Perform capacity test on watermarked image. ∙ Compare the results obtained. 4 Experimental results 4.1 Images used The images used for the watermarking is the logo of Federal University of Agriculture, Abeokuta, Nigeria, as shown in Figure 2 and the image “LENA” popularly used for image processing, downloaded from the Internet as shown in Figure 3. IJNS email for contribution: editor@nonlinearscience.org.uk
  • 6. M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 363 Figure 2: UNAAB logo. Figure 3: Lena Image. A visible watermarked image is shown in Figure 4 for key = 2 while Figure 5 shows an invisible watermarking at key =16. Figure 4: Visible watermarking. Figure 5: Invisible watermarking. 4.2 Results and Discussion The functions of robustness, channel capacity and distortion were coded in MATLAB 7.1. The results from the program were based on various effects of block sizes on time, capacity, robustness, distortion and imperceptibility of the water- marked image after subjecting the watermarked image to various tests according to their block sizes. Table 1 summarizes the results of the above attributes. Looking at Table 1, the DCT time is very high at block size 2 x 2 with 7.31s and gradually reduces to 5.160 at block size 4 x 4 and 0.616s at block size 64 x 64. For the attribute of robustness, the percentage signal-to-noise ratio is very low at block size 2 x 2 with 62.063 db and gradually increases to 65.490(block size 4 x 4), 68.731(block size 8 x 8), 69.996(block size 16 x 16),70.904(block size 32 x32 ) and 70.989 (block size 64 x 64). The attribute of capacity gradually increases as the block size increases as depicted in Table 1. Every communication channel suffers from distortion. Therefore, hiding a watermark in an image will introduce some measures of distortion in the original image. Distortion in this study showed that the values vary significantly with block sizes together with the step size as illustrated in Table 2. For example, at block size 2 x 2 with steps 2, 4, 8, 16, 32 and 64, distortion values are 0.3629, 4.0646, 1.2178, 13.2961, 39.999, and 132.5639. Figure 6 shows the distortion values of block sizes (2 x 2, 4 x 4, 8 x 8, 16 x 16, 32 x 32 and 64 x 64) as against step 2. The same fluctuations are noticed for other distortion values of block sizes as against their step sizes. Moreso, values of distortion in various step sizes as against a particular block size are also noted as illustrated in table 2 with their fluctuation as shown in figure 6. IJNS homepage: http://www.nonlinearscience.org.uk/
  • 7. 364 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366 The block size used for watermarking is independent of the imperceptibility of the watermark. The embedded image introduced distortions into the original image and does not control the imperceptibility of the watermark. The impercep- tibility depends on the embedding factor, 𝛽 of the watermark. The perceptibility of watermark reduces as the key used ( 2, 4, 8, 16, 32, 64, etc ) which corresponds to block sizes (2 x 2, 4 x 4, 8 x 8, 16 x 16, 32 x 32, 64 x 64, etc ) increases. For example, the watermark is visible with keys 2, 4, and 8 but not visible with keys 16, 32, and 64 as shown in table 1. At key 16 which corresponds to block size 16 x 16, the watermarked image still looks like the original image despite the hidden watermark. Table 1: The summary of the various attributes values. Key Block Size Robustness Time Visibility Capacity 2 2x2 62.063 7.318 Visible 31.532 4 4x4 65.490 5.160 Visible 33.245 8 8x8 68.731 1.760 Visible 34.865 16 16x16 69.996 0.880 Not visible 35.455 32 32x32 70.904 0.716 Not visible 35.952 64 64 x 64 70.989 0.616 Not visible 35.966 Table 2: Summary of Block size with Distortion values in different step Sizes. Block size Distortion Step=2 Distortion Step=4 Distortion Step=8 Distortion Step=16 Distortion Step=32 Distortion Step=64 2 x 2 0.3629 4.0646 1.2178 13.2961 39.9999 132.5639 4 x 4 0.3051 3.3734 1.0026 10.5401 30.5552 79.7364 8 x 8 0.2721 2.1697 0.6867 7.4734 27.6999 72.1493 16 x 16 0.3007 3.1966 0.9945 10.4414 29.1143 72.9128 32 x32 0.3177 3.8375 1.1307 12.0094 33.2575 81.4464 64 x 64 0.3302 4.4939 1.2562 14.3236 39.4926 93.7040 Step=2 DT = 0.3629 0.3051 0.2721 0.3007 0.3177 0.3302 DT= distortion. 5 Conclusion This work has applied discrete cosine transform (DCT) to achieve visible and invisible watermarking of a digital image against piracy. The work has also investigated the effect of block size and step size on the attributes of the watermarked image. It was found that the time for watermarking reduces as block size increases, capacity and robustness increase with block size. Distortion fluctuated below block size 8 x 8 but gradually increases above the block size. Above 8 x 8 the watermark is invisible and block size 16 x 16 can serve as a means of checking piracy of digital images because the watermarked image produced resembles the original image despite the fact that it contains a hidden watermark. References [1] Allan MB: A review of digital watermarking. Department of Engineering, University of Aberdeen. (2001). [2] Embry A: Influence of DCT on coding efficiency. University of Stanford, USA, EE368B. (2000). [3] Janahan C: Digital image watermarking - An overview.Indian Institute of Information Technology, India.(2000). [4] Chou J: New generation technique for robust and imperceptible audio data hiding. IJNS email for contribution: editor@nonlinearscience.org.uk
  • 8. M. O. Agbaje , et al: Effect of Block Sizes on the Attributes of Watermarking Digital Images 365 Figure 6: Distortion values of various block sizes with step size 2. [5] Zhang Z, Zhu Z, Xi L: Novel scheme for watermarking stereo video. International Journal of Nonlinear Science. 3:(2007),74-80. [6] Kan H: Adaptive visible watermarking for images. Appeared in Proc of ICMCS 99, Florence, Italy. (1999). [7] Wong P: Protecting digital media content. ACM. 41:(1999),35-43 . [8] Barni M, Bartolini F, Checcacci: Watermarking of MPEG-4 video objects. IEEE Transactions on Multimedia. 7:(2005),23-32. [9] Cayre F, Fontaine C, Furon T: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing. 53:(2005),3976-3987. [10] Mobasseri BG, Berger RJ: A foundation for watermarking in compressed domain. IEEE Signal Processing Letters. 12:(2005),399-402. [11] Lei CL, Yu PL, Tsa PL, Chan MH: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transac- tions on Signal Processing. 13:(2004),1618-1626. [12] Joshua RS: Modulation and information hiding in image: Published in Proceeding of first information hiding work- shop.Isaac Newton Institute, Cambridge. (1996). [13] Marnel LM, Boncelet CG, Retter CT: Spread spectrum image steganography. IEEE Transactions on Signal Process- ing. 6:(1999),1075-1083. [14] Sun M, Tian L, Yin J: Hopf bifurcation analysis of the energy resource chaotic system. International Journal of Nonlinear Science. 1:(2006),49-53. [15] Cai G, Huang J, Tian L, Wang Q: Adaptive control and slow manifold analysis of a new chaotic system. International Journal of Nonlinear Science. 2:(2006),50-60. [16] Wang X, Tian L, Yu L: Linear feedback controlling and synchronization of the Chen’s chaotic system. International Journal of Nonlinear Science. 2:(2006),43-49. [17] Idowu BA, Vincent UE, Njah AN: Control and synchronization of chaos in nonlinear gyros via backstepping design. Internatinal Journal of Nonlinear Science. 5:(2008),11-19. [18] Njah AN, Vincent UE: Synchronization and anti-synchronization of chaos in an extended Bonhöffer-van der Pol oscillator using active control. Journal of Sound and Vibration. 319:(2009),41-49. [19] Njah AN, Ojo KS: Synchronization via backstepping nonlinear control of externally excited Φ6 van der Pol and Φ6 Duffing oscillators. Far East Journal of Dynamical Systems. 11:(2009),41-49. [20] Koch E, Zhao J: Towards robust and hidden image copyright labeling. In Proceeding of IEEE Nonlinear Signal Processing Workshop. pp (1995), 452-455. [21] Bors A, Pitas I: Image watermarking using DCT domain constraints. In Conference IEEE Image Processing, Lau- sanne, Switzerland. (1996) ,231-234. [22] Cox I, Kilian J, Leighton FT, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing. 6:(1997),1673-1687. IJNS homepage: http://www.nonlinearscience.org.uk/
  • 9. 366 International Journal of NonlinearScience,Vol.9(2010),No.3,pp. 358-366 [23] Suhail MA: Simulation study of digital watermarking in JPEG 2000 schemes. IEEE Transaction on Watermarking. (2001). [24] Kingbury N: 2-dimensional discrete cosine transform. Connexious. (2005). [25] Juan RH: Statistical analysis of watermarking schemes for copyright protection of image. IEEE. (1999). [26] Seng C: Perfomance factor analysis of wavelet based watermarking methods. IEEE. (2005). [27] Natarajan NT, Rao KR: On image processing and a discrete cosine transform. IEEE Transaction on Computer C-23 (1974). [28] Tao B, Dikson B: Adaptive watermarking in DCT domain. International Conference on Acoustics Speech and Signal Processing. ICASSP (1997). [29] Saraju PM: A discrete cosine transform domain visible watermarking for images. Department of Computer Sciences and Engineering, University of South Florida, F.I 33620, USA (2000). [30] Seyd A: The discrete cosine transform theory and application.Department of Electrical and Computer Engineering, Michigan State University. (2003). IJNS email for contribution: editor@nonlinearscience.org.uk