SlideShare a Scribd company logo
1 of 9
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. I (Jan. - Feb .2016), PP 06-14
www.iosrjournals.org
DOI: 10.9790/2834-11110614 www.iosrjournals.org 6 | Page
A Hybrid Model of Watermarking Scheme for Color Image
Authentication Using Discrete Wavelet Transform and Singular
Value Decomposition
Sukanta Kumar Tulo, Dr. Nalinikanta Barpanda, Subhrajit Pradhan,
A. Amiya Kumar Gupta
Department of Electronics Engineering, GIET, GUNUPUR, INDIA
Abstract: Digital Watermarking is a process of embedding information in the multimedia content (host or
cover image) for image authentication. An ideal watermarking system would embed an amount of information
that could not be removed or altered without making the cover object entirely unusable. Over the past few years
digital watermarking has become popular due to its significance in content authentication and legal ownership
for digital multimedia data. A digital watermark is a sequence of information containing the owner’s copyright.
It is inserted invisibly in another image so that it can be extracted at later times for the evidence of rightful
ownership. Available digital watermarking techniques can be categorized into one of the two domains, viz.,
spatial and transform, according to the embedding domain of the host image. Based on these domains digital
watermarking can be done by FFT, DCT, DWT, SVD. The analysis proves that the proposed DWT-SVD hybrid
model is much more superior to other models as it is found to be more robust and effective. The results revealed
that the hybrid model is able to withstand a variety of attacks and shows high level of security.
Keywords: Digital Watermarking, Discrete Wavelet Transform, Hybrid model, Singular Value Decomposition,
Peak Signal to Noise Ratio (PSNR).
I. Introduction
The growth of digital media and the fact that unlimited numbers of perfect copies of such media can be
illegally produced is a threat to the rights of content owners. A copy of digital media is an exact duplicate of the
original. The authors of a work are hesitant to make such information available on the Internet as it may be
copied and retransmitted without the permission of the author. An issue facing electronic commerce on the
Internet for digital information is how to protect the copyright and intellectual property rights of those who
legally own or posses’ digital works. Copyright protection involves ownership authentication and can be used to
identify illegal copies. One approach to copyrighting is to mark works by adding information about their
relationship to the owner by a digital watermark. Digital watermarking is the process of embedding information
into a digital signal which may be used to verify its authenticity or the identity of its owners, in the same manner
as paper bearing a watermark for visible identification. In digital watermarking, the signal may be audio,
pictures, or video. This information may be perceptible or imperceptible to the human senses. Early
watermarking work investigated how documents can be marked so they can be traced in the photocopy process.
If the signal is copied, then the information also is carried in the copy. A signal may carry several different
watermarks at the same time. In visible digital watermarking, the information is visible in the picture or video.
Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has
a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a
visible watermark. In invisible digital watermarking, information is added as digital data to audio, picture, or
video, but it cannot be perceived as such (although it may be possible to detect that some amount of information
is hidden in the signal). The watermark may be intended for widespread use and thus, is made easy to retrieve
or, it may be a form of Steganography, where a party communicates a secret message embedded in the digital
signal. Digital watermarks are employed in an attempt to provide proof of ownership and identify illicit copying
and distribution of multimedia information. This contributes an overview of information hiding methods for
digital media and proposes a new way of watermark technique. The main objective of this work is to develop a
watermarking technique to satisfy both imperceptibility and robustness requirements. To achieve this objective
different watermarking scheme like DWT and SVD are discussed and a hybrid model of watermarking scheme
based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In our
approach, the watermark is embedded on the elements of singular values of the cover image’s DWT sub bands.
Remaining paper is organized as follows: section 2 discusses the existing related work in the field of digital
image watermarking. Section 3 explains the proposed watermarking model. Section 4 shows the result and
performance analysis. Section 5 contains conclusion.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 7 | Page
II. Related Work
2.1 Literature Review
G. Bhatnagar et.al [1] represented a reference watermarking scheme based on DWT-SVD for an image.
Here a basic idea has been given regarding this scheme. J. Sang et.al. [2] Investigated the fragility and
robustness of binary-phase only filter-based fragile/semi fragile digital image watermarking. Here main concern
is given on fragile and semi fragile digital watermarking and the robustness is been calculated. X.W Kong et.al
[7], proposed the scheme for Object Watermarks for Digital Images and Video. He proposed the SVD based
scheme for embedding the watermarks in the digital image and coloured video. Z. Xinzhong et.al. [10], has
developed A modern Digital Watermarking Algorithm Based on Improved SVD. The improved algorithm is
applied on different samples of images and verified that the improved algorithm is more robust than the
algorithm based on SVD.
2.2 Different Schemes of Watermarking
General digital watermark life-cycle phases with embedding-, attacking and detection and retrieval
functions. The information to be embedded in a signal is called a digital watermark, although in some contexts
the phrase digital watermark means the difference between the watermarked signal and the cover signal. The
signal where the watermark is to be embedded is called the host signal. A watermarking system is usually
divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host
and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is
transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an
attack. There are many possible modifications, for example, lossy compression of the data (in which resolution
is diminished), cropping an image or video or intentionally adding noise. Detection (often called extraction) is
an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was
unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital
watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if
the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change
is made to the signal.
Figure 1: Digital Watermarking Life Cycle
2.2.1 Watermarking Using DWT
Discrete wavelet transform (DWT) is a transform-domain technique where the watermark is embedded
by modulating the magnitude of coefficients in a transform domain, such as wavelet transform. Due to its
excellent spatial-frequency localization properties, the DWT is very suitable to identify areas in the cover image
where a watermark can be imperceptibly embedded. The main idea behind DWT results from multiresolution
analysis, which involves decomposition of an image in frequency channels of constant bandwidth on a
logarithmic scale. It has advantages such as similarity of data structure with respect to the resolution and
available decomposition at any level. The DWT can be implemented as a multistage transformation. An image
is decomposed into four sub bands denoted LL, LH, HL, and HH at level 1 in the DWT domain, where LH, HL
and HH represent the finest scale wavelet coefficients and LL stands for the coarse-level coefficients. The LL
sub band can further be decomposed to obtain another level of decomposition. The decomposition process
continues on the LL sub band until the desired number of levels determined by the application is reached. Since
human eyes are much more sensitive to the low-frequency part (the LL sub band), the watermark can be
embedded in the other three sub bands to maintain better image quality.
2.2.2 Watermarking Using SVD
Singular value decomposition (SVD) is a transform-domain technique where the watermark is
embedded by modulating the magnitude of coefficients in a transform domain. One of attractive mathematical
properties of SVD is that slight variations of singular values do not affect the visual perception of the cover
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 8 | Page
image, which motivates the watermark embedding procedure to achieve better transparency and robustness.
From the perspective of image processing, an image can be viewed as a matrix with nonnegative scalar entries.
The SVD of an image A with size m×m is given by A = USV T
, where U and V are orthogonal matrices, and S =
diag(λi) is a diagonal matrix of singular values λi, i = 1, . . . , m, which are arranged in decreasing order. The
columns of U are the left singular vectors, whereas the columns of V are the right singular vectors of image A.
The basic idea behind the SVD-based watermarking techniques is to find the SVD of the cover image or each
block of the cover image, and then modify the singular values to embed the watermark.
III. Proposed Hybrid Model Of Watermarking Using Dwt & Svd
In this approach, the watermark is not embedded directly on the wavelet coefficients but rather than on
the elements of singular values of the cover image’s DWT sub bands. Since performing SVD on an image is
computationally expensive, this study aims to develop a hybrid DWT-SVD based watermarking scheme that
requires less computation effort to yield better performance. After decomposing the cover image into four sub
bands by one-level DWT, we apply SVD only to the intermediate frequency sub bands and embed the
watermark into the singular values of the afore mentioned sub bands to meet the imperceptibility and robustness
requirements.
The main properties of this approach can be identified as:
 It needs less SVD computation than other methods
 Unlike most existing DWT-SVD-based algorithms, which embed singular values of the
watermark into the singular values of the cover image, our approach directly embeds the
watermark into the singular values of the cover image to better preserve the visual perceptions
of images.
The DWT-SVD watermarking scheme can be formulated as given here.
a) Watermark embedding:
1) Use one-level Haar DWT to decompose the cover image A into four sub bands (i.e., LL, LH, HL, and HH).
2) Apply SVD to LH and HL sub bands, i.e.
Ak
= Uk
Sk
V kT
, k= 1, 2 (1)
Where k represents one of two sub bands.
3) Divide the watermark into two parts:
W = W1
+W2
...Where Wk
denotes half of the watermark.
4) Modify the singular values in HL and LH sub bands with half of the watermark image and then apply SVD to
them, respectively, i.e.,
Sk
+ αWk
= (2)
Where α denotes the scale factor. The scale factor is used to Control the strength of the watermark to be
inserted.
5) Obtain the two sets of modified DWT coefficients, i.e.
A∗k
= Uk
V kT
, k= 1, 2 (3)
6) Obtain the watermarked image by performing the inverse DWT using two sets of modified DWT coefficients
and two sets of non modified DWT coefficients.
The block diagram representation of the above mentioned procedure of watermark embedding is shown
in figure 2.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 9 | Page
Figure 2: Watermark embedding
b) Watermark extraction:
1) Use one-level Haar DWT to decompose the watermarked (possibly distorted) image A∗W into four sub
bands: LL, LH, HL, and HH.
2) Apply SVD to the LH and HL sub bands, i.e.
= U∗k
V ∗kT
, k= 1, 2 (4)
Where k represents one of two sub bands.
3) Compute D∗k
= , k = 1, 2.
4) Extract half of the watermark image from each sub band, i.e.,
W∗k
= (D∗k
− Sk
)/α, k = 1, 2 (5)
5) Combine the results of Step 4 to obtain the embedded watermark:
W∗ = W∗1
+W∗2
.
The block diagram representation of the above mentioned procedure of watermark extraction is shown
in figure 3.
Figure 3: Watermark Extraction
c) Sequence Followed
The approach mainly dealt with the following items in sequence
1. Representing an image in the form of a Matrix
2. Taking out the Transformation let it be DWT or SVD
3. Embedding the watermark/secret image with the cover image to get the watermarked image
4. Neglecting fine details which also involves in elimination of noise
5. Reconstructing the watermark image from the watermarked image.
6. Calculating the PSNR for various levels of approximations and comparing them.
Transformation and Reconstruction
DWT performs wavelet decomposition of vector X with respect to a particular wavelet or particular
wavelet filters that you specify. Instead of transmitting the original matrix as a whole, proper choice of these
coefficients is made out and only selected coefficients are transmitted. The reverse procedure is carried out
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 10 | Page
while reconstructing the image. The inverse transformation is carried out for each of the available coefficients
and the representation matrix is obtained. IDWT carries out Wavelet reconstruction.
PSNR (Peak signal to noise ratio)
As a measure of the quality of a watermarked image, the peak signal-to noise ratio (PSNR) was used.
We use the PSNR as an objective means of performance. PSNR is used to measure the difference between two
images. It is defined as
PSNR=20* Log10 (b/rms)
Where b is the largest possible value of the signal (typically 255 or 1), and rms is the root mean
square difference between two images. The PSNR is given in decibel units (dB), which measure the ratio of the
peak signal and the difference between two images. An increase of 20 dB corresponds to a ten-fold decrease in
the rms difference between two images. There are many versions of signal to noise ratios, but the PSNR is very
common in image processing, probably because it gives better sounding numbers than other measures.
IV. Result And Performance Analysis
4.1 Result Using DWT Scheme of Watermarking
 The cover image and the watermark image to be watermarked are shown in the figure 4 and figure 5
respectively.
Figure 4: Original Cover Image Figure 5: Watermark Image
 The watermarked image obtained from the DWT scheme is shown in figure 6.
Figure 6: Watermarked Image Using DWT
 Figure 7 and Figure 8 represents the difference between the original cover image and the watermarked
image and key generated respectively.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 11 | Page
Figure 7: Difference Image Figure 8: Key Generated
 The calculated PSNR values in DWT scheme with different scaling factor (α) are listed in Table 1.
Table 1: PSNR values for different scaling factor in DWT scheme
4.2 Result Using SVD Scheme of Watermarking
 Figure 9 and figure 10 shows the watermarked image and watermarked with noise image after SVD
technique respectively.
Figure 9: Watermarked Image Figure 10: Watermarked and Noised Image
 The watermark image can be reconstructed from the watermarked image and the recovered
watermark image is shown in the figure 11.
Figure 11: Recovered Watermark Image
 Figure 12, 13, 14 and 15 shows the watermarking of a text file in cover image using SVD scheme of
watermarking.
α = 0.01 α = 0.05 α = 0.09
40.1538 38.8375 37.0752
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 12 | Page
Figure 12: Cover image Figure 13: Watermark to be embedded
Figure 14: Watermarked image Figure 15: Watermarked and noised image
 The watermark text can be reconstructed from the watermarked image. The recovered watermark
image is shown in the figure 16.
Figure 16: Recovered watermark image
 The calculated PSNR values in SVD scheme with different scaling factor (α) are listed in Table 2.
Table 2: PSNR values for different scaling factor in SVD scheme
4.3 Result using the hybrid DWT-SVD Scheme of Watermarking
 The figures 17 and 18 show the cover image and the gray scale converted image of the cover image
used in DWT-SVD scheme of watermarking
α = 0.01 α = 0.05 α = 0.09
40.2439 38.9437 37.0012
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 13 | Page
Figure 17: Cover image Figure 18: Gray scale converted image
 The figures 19 and 20 show the watermark image and the gray scale converted image of the watermark
image.
Figure 19: Cover image Figure 20: Gray scale converted image
 The figures 21 and 22 show the SVD image of the cover image and watermarked image after applying
DWT-SVD technique.
Figure 21: SVD image Figure 22: Watermarked image
 The calculated PSNR values in DWT-SVD scheme with different scaling factor (α) are listed in the
Table 3.
Table 3: PSNR values for different scaling factor in DWT-SVD scheme
Here three watermarking schemes namely: Watermarking using DWT, SVD and a hybrid model using
DWT & SVD are implemented and compared. Watermark extraction was performed on watermarked images
using these three models. The output images and results are observed to compare the performance of these
α = 0.01 α = 0.05 α = 0.09
40.4387 39.0513 37.1996
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 14 | Page
schemes. The values of the scaling factors are taken as 0.01, 0.05 and 0.09 and the results are illustrated in Table
4.
WATERMARKING
SCHEME
PSNR,
WITH α =0.01
PSNR,
WITH α =0.05
PSNR,
WITH α =0.09
DWT 40.1538 38.8375 37.0752
SVD 40.2439 38.9437 37.0012
DWT-SVD 40.4387 39.0513 37.1996
Table 4: Comparison of PSNR for DWT, SVD and Hybrid model DWT-SVD Scheme of Watermarking
V. Conclusion
Hybrid image watermarking technique based on DWT and SVD has been presented, where the
watermark is embedded on the singular values of the cover image’s DWT sub bands. The technique fully
exploits the respective feature of these two transform domain methods: Spatio-frequency localization of DWT
and SVD efficiently represents intrinsic algebraic properties of an image. The results show that the proposed
hybrid DWT-SVD scheme has both the significant improvement in imperceptibility and the robustness. It is
observed that the larger the scaling factor, the stronger is the robustness of the applied watermarking scheme
and it can withstand a variety of image-processing attacks. In addition to quantitative measurement, the hybrid
model has also given better visual perceptions of the extracted watermarks. Thus the DWT-SVD hybrid model
watermarking scheme significantly outperforms the other two schemes of watermarking.
References
[1] G. Bhatnagar and B. Raman, ―A new robust reference watermarking scheme based on DWT-SVD‖,Comput. Standards Interfaces,
Sep 2009, vol. 31, no. 5, pp. 1002–1013.
[2] J. Sang and M. S. Alam, ― Fragility and robustness of binary-phase-only filter-Based fragile/semi fragile digital image
watermarking‖, IEEE Transactions on Instrumentation and Measurement, Mar. 2008, vol. 57, no. 3, pp. 595–606.
[3] H.-T. Wu and Y.M. Cheung,― Reversible watermarking by modulation and security enhancement‖, IEEE Trans. Instrum. Meas.,
Jan. 2010, vol. 59, no. 1, pp. 221–228.
[4] V. Aslantas, L. A. Dog˘an, and S. Ozturk, ―DWT-SVD based image watermarking using particle swarm optimizer,‖ in Proc. IEEE
Int. Conf. Multimedia Expo, Hannover, Germany, 2008, pp. 241–244.
[5] Doerr, G. and J. Dugelay, ―A guided tour to video watermarking. Signal Processing‖, Image Commun., 2003, 18:263-282.
[6] Chan, P. and M. Lyu,,‖A DWT-based digital video watermarking scheme with error correcting code‖. Lecture Notes Comput. Sci.,
2003.2836: 202-213. DOI: _10 1007/b13930.
[7] X.W Kong, Y. Liu, H.J Liu, and D.L Yang, "Object Watermarks for Digital Images and Video", Image and Vision Computing,
2004, Vol. 22, pp.583-595.
[8] Chien-Chuan Ko, and Bo-Zhi Yang,‖ An Integrated Technique for Video Watermarking‖, 6th IEEE/ACIS International
Conference on Computer and Information Science (ICIS 2007).
[9] J. M. Shieh ,D. C. Lou ,M. C. Chang, ―A Semi-Blind Digital Watermarking Scheme Based on Singular Value Decomposition,‖
Journal of Computer Standards & Interfaces, 2006, vol. 28, no. 4, pp. 428–440.
[10] Z. Xinzhong , Z. Jianmin, X. Huiying , ―A Digital Watermarking Algorithm and Implementation Based on Improved SVD,‖ The
18th
International Conference on Pattern Recognition (ICPR’06), 2006, vol. 3, pp.651–656.
[11] Chang, C., P. Tsai and C. Lin,‖SVD-based digital image watermarking scheme.‖ Patt. Recog. Lett., 26: 1577-1586.
DOI:10.1016/j.patrec.2005.01.00411, 2005.
[12] R. Liu, and T. Tan, ―An SVD-Based Watermarking Scheme for Protecting Rightful Ownership‖, IEEE Transactions on Multimedia,
2002, vol. 4, pp. 121–128.
[13] M Ali and CW Ahn, ―An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain‖, Signal
Processing, Elsevier, vol. 94, 2014, pp 545–556.
[14] N.M. Makbol, B.E. Khoo,‖ Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and
Singular Value Decomposition‖, AEU—International Journal of Electronics and Communications, 67 (2) (2013), pp. 102–112.
[15] X. Wu, W. Sun,‖ Robust copyright protection scheme for digital images using overlapping DCT and SVD‖, Applied Soft
Computing, 13 (2) (2013), pp. 1170–1182.

More Related Content

What's hot

Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
Agnianbu Wrong
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
International Journal of Science and Research (IJSR)
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
debasis sahoo
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Parag Agarwal
 

What's hot (18)

robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
dwm
dwmdwm
dwm
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...
 
1709 1715
1709 17151709 1715
1709 1715
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniques
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Viewers also liked

Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
 
Effect of Regular Exercise on Prolactin Secretion: A Pilot Study
Effect of Regular Exercise on Prolactin Secretion: A Pilot StudyEffect of Regular Exercise on Prolactin Secretion: A Pilot Study
Effect of Regular Exercise on Prolactin Secretion: A Pilot Study
IOSR Journals
 
Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...
Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...
Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...
IOSR Journals
 

Viewers also liked (20)

C1803061620
C1803061620C1803061620
C1803061620
 
M017369095
M017369095M017369095
M017369095
 
N010237982
N010237982N010237982
N010237982
 
Vitality of Physics In Nanoscience and Nanotechnology
Vitality of Physics In Nanoscience and NanotechnologyVitality of Physics In Nanoscience and Nanotechnology
Vitality of Physics In Nanoscience and Nanotechnology
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
The Reliability Study of 11-Kv Distribution Feeders: A Case Study of Idi-Arab...
The Reliability Study of 11-Kv Distribution Feeders: A Case Study of Idi-Arab...The Reliability Study of 11-Kv Distribution Feeders: A Case Study of Idi-Arab...
The Reliability Study of 11-Kv Distribution Feeders: A Case Study of Idi-Arab...
 
Synthesis, Characterization and Anti-inflammatory Activity of Novel Triazolod...
Synthesis, Characterization and Anti-inflammatory Activity of Novel Triazolod...Synthesis, Characterization and Anti-inflammatory Activity of Novel Triazolod...
Synthesis, Characterization and Anti-inflammatory Activity of Novel Triazolod...
 
Effect of Regular Exercise on Prolactin Secretion: A Pilot Study
Effect of Regular Exercise on Prolactin Secretion: A Pilot StudyEffect of Regular Exercise on Prolactin Secretion: A Pilot Study
Effect of Regular Exercise on Prolactin Secretion: A Pilot Study
 
J012637178
J012637178J012637178
J012637178
 
P01254123131
P01254123131P01254123131
P01254123131
 
A1804010105
A1804010105A1804010105
A1804010105
 
D010121832
D010121832D010121832
D010121832
 
Monitoring Of Macronutrients Uptake by Soil and Potato Plants – A Comparative...
Monitoring Of Macronutrients Uptake by Soil and Potato Plants – A Comparative...Monitoring Of Macronutrients Uptake by Soil and Potato Plants – A Comparative...
Monitoring Of Macronutrients Uptake by Soil and Potato Plants – A Comparative...
 
G1803024452
G1803024452G1803024452
G1803024452
 
J010126267
J010126267J010126267
J010126267
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предприниматели
 
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
 
D010321824
D010321824D010321824
D010321824
 
Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...
Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...
Molecular characterization of pea (Pisum sativum L.) using microsatellite mar...
 
S0102297102
S0102297102S0102297102
S0102297102
 

Similar to B011110614

A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
prjpublications
 

Similar to B011110614 (20)

A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
E04122330
E04122330E04122330
E04122330
 
1709 1715
1709 17151709 1715
1709 1715
 
1918 1923
1918 19231918 1923
1918 1923
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
50120130406038
5012013040603850120130406038
50120130406038
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 

More from IOSR Journals

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

B011110614

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. I (Jan. - Feb .2016), PP 06-14 www.iosrjournals.org DOI: 10.9790/2834-11110614 www.iosrjournals.org 6 | Page A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Discrete Wavelet Transform and Singular Value Decomposition Sukanta Kumar Tulo, Dr. Nalinikanta Barpanda, Subhrajit Pradhan, A. Amiya Kumar Gupta Department of Electronics Engineering, GIET, GUNUPUR, INDIA Abstract: Digital Watermarking is a process of embedding information in the multimedia content (host or cover image) for image authentication. An ideal watermarking system would embed an amount of information that could not be removed or altered without making the cover object entirely unusable. Over the past few years digital watermarking has become popular due to its significance in content authentication and legal ownership for digital multimedia data. A digital watermark is a sequence of information containing the owner’s copyright. It is inserted invisibly in another image so that it can be extracted at later times for the evidence of rightful ownership. Available digital watermarking techniques can be categorized into one of the two domains, viz., spatial and transform, according to the embedding domain of the host image. Based on these domains digital watermarking can be done by FFT, DCT, DWT, SVD. The analysis proves that the proposed DWT-SVD hybrid model is much more superior to other models as it is found to be more robust and effective. The results revealed that the hybrid model is able to withstand a variety of attacks and shows high level of security. Keywords: Digital Watermarking, Discrete Wavelet Transform, Hybrid model, Singular Value Decomposition, Peak Signal to Noise Ratio (PSNR). I. Introduction The growth of digital media and the fact that unlimited numbers of perfect copies of such media can be illegally produced is a threat to the rights of content owners. A copy of digital media is an exact duplicate of the original. The authors of a work are hesitant to make such information available on the Internet as it may be copied and retransmitted without the permission of the author. An issue facing electronic commerce on the Internet for digital information is how to protect the copyright and intellectual property rights of those who legally own or posses’ digital works. Copyright protection involves ownership authentication and can be used to identify illegal copies. One approach to copyrighting is to mark works by adding information about their relationship to the owner by a digital watermark. Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners, in the same manner as paper bearing a watermark for visible identification. In digital watermarking, the signal may be audio, pictures, or video. This information may be perceptible or imperceptible to the human senses. Early watermarking work investigated how documents can be marked so they can be traced in the photocopy process. If the signal is copied, then the information also is carried in the copy. A signal may carry several different watermarks at the same time. In visible digital watermarking, the information is visible in the picture or video. Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark. In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden in the signal). The watermark may be intended for widespread use and thus, is made easy to retrieve or, it may be a form of Steganography, where a party communicates a secret message embedded in the digital signal. Digital watermarks are employed in an attempt to provide proof of ownership and identify illicit copying and distribution of multimedia information. This contributes an overview of information hiding methods for digital media and proposes a new way of watermark technique. The main objective of this work is to develop a watermarking technique to satisfy both imperceptibility and robustness requirements. To achieve this objective different watermarking scheme like DWT and SVD are discussed and a hybrid model of watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In our approach, the watermark is embedded on the elements of singular values of the cover image’s DWT sub bands. Remaining paper is organized as follows: section 2 discusses the existing related work in the field of digital image watermarking. Section 3 explains the proposed watermarking model. Section 4 shows the result and performance analysis. Section 5 contains conclusion.
  • 2. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 7 | Page II. Related Work 2.1 Literature Review G. Bhatnagar et.al [1] represented a reference watermarking scheme based on DWT-SVD for an image. Here a basic idea has been given regarding this scheme. J. Sang et.al. [2] Investigated the fragility and robustness of binary-phase only filter-based fragile/semi fragile digital image watermarking. Here main concern is given on fragile and semi fragile digital watermarking and the robustness is been calculated. X.W Kong et.al [7], proposed the scheme for Object Watermarks for Digital Images and Video. He proposed the SVD based scheme for embedding the watermarks in the digital image and coloured video. Z. Xinzhong et.al. [10], has developed A modern Digital Watermarking Algorithm Based on Improved SVD. The improved algorithm is applied on different samples of images and verified that the improved algorithm is more robust than the algorithm based on SVD. 2.2 Different Schemes of Watermarking General digital watermark life-cycle phases with embedding-, attacking and detection and retrieval functions. The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. There are many possible modifications, for example, lossy compression of the data (in which resolution is diminished), cropping an image or video or intentionally adding noise. Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change is made to the signal. Figure 1: Digital Watermarking Life Cycle 2.2.1 Watermarking Using DWT Discrete wavelet transform (DWT) is a transform-domain technique where the watermark is embedded by modulating the magnitude of coefficients in a transform domain, such as wavelet transform. Due to its excellent spatial-frequency localization properties, the DWT is very suitable to identify areas in the cover image where a watermark can be imperceptibly embedded. The main idea behind DWT results from multiresolution analysis, which involves decomposition of an image in frequency channels of constant bandwidth on a logarithmic scale. It has advantages such as similarity of data structure with respect to the resolution and available decomposition at any level. The DWT can be implemented as a multistage transformation. An image is decomposed into four sub bands denoted LL, LH, HL, and HH at level 1 in the DWT domain, where LH, HL and HH represent the finest scale wavelet coefficients and LL stands for the coarse-level coefficients. The LL sub band can further be decomposed to obtain another level of decomposition. The decomposition process continues on the LL sub band until the desired number of levels determined by the application is reached. Since human eyes are much more sensitive to the low-frequency part (the LL sub band), the watermark can be embedded in the other three sub bands to maintain better image quality. 2.2.2 Watermarking Using SVD Singular value decomposition (SVD) is a transform-domain technique where the watermark is embedded by modulating the magnitude of coefficients in a transform domain. One of attractive mathematical properties of SVD is that slight variations of singular values do not affect the visual perception of the cover
  • 3. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 8 | Page image, which motivates the watermark embedding procedure to achieve better transparency and robustness. From the perspective of image processing, an image can be viewed as a matrix with nonnegative scalar entries. The SVD of an image A with size m×m is given by A = USV T , where U and V are orthogonal matrices, and S = diag(λi) is a diagonal matrix of singular values λi, i = 1, . . . , m, which are arranged in decreasing order. The columns of U are the left singular vectors, whereas the columns of V are the right singular vectors of image A. The basic idea behind the SVD-based watermarking techniques is to find the SVD of the cover image or each block of the cover image, and then modify the singular values to embed the watermark. III. Proposed Hybrid Model Of Watermarking Using Dwt & Svd In this approach, the watermark is not embedded directly on the wavelet coefficients but rather than on the elements of singular values of the cover image’s DWT sub bands. Since performing SVD on an image is computationally expensive, this study aims to develop a hybrid DWT-SVD based watermarking scheme that requires less computation effort to yield better performance. After decomposing the cover image into four sub bands by one-level DWT, we apply SVD only to the intermediate frequency sub bands and embed the watermark into the singular values of the afore mentioned sub bands to meet the imperceptibility and robustness requirements. The main properties of this approach can be identified as:  It needs less SVD computation than other methods  Unlike most existing DWT-SVD-based algorithms, which embed singular values of the watermark into the singular values of the cover image, our approach directly embeds the watermark into the singular values of the cover image to better preserve the visual perceptions of images. The DWT-SVD watermarking scheme can be formulated as given here. a) Watermark embedding: 1) Use one-level Haar DWT to decompose the cover image A into four sub bands (i.e., LL, LH, HL, and HH). 2) Apply SVD to LH and HL sub bands, i.e. Ak = Uk Sk V kT , k= 1, 2 (1) Where k represents one of two sub bands. 3) Divide the watermark into two parts: W = W1 +W2 ...Where Wk denotes half of the watermark. 4) Modify the singular values in HL and LH sub bands with half of the watermark image and then apply SVD to them, respectively, i.e., Sk + αWk = (2) Where α denotes the scale factor. The scale factor is used to Control the strength of the watermark to be inserted. 5) Obtain the two sets of modified DWT coefficients, i.e. A∗k = Uk V kT , k= 1, 2 (3) 6) Obtain the watermarked image by performing the inverse DWT using two sets of modified DWT coefficients and two sets of non modified DWT coefficients. The block diagram representation of the above mentioned procedure of watermark embedding is shown in figure 2.
  • 4. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 9 | Page Figure 2: Watermark embedding b) Watermark extraction: 1) Use one-level Haar DWT to decompose the watermarked (possibly distorted) image A∗W into four sub bands: LL, LH, HL, and HH. 2) Apply SVD to the LH and HL sub bands, i.e. = U∗k V ∗kT , k= 1, 2 (4) Where k represents one of two sub bands. 3) Compute D∗k = , k = 1, 2. 4) Extract half of the watermark image from each sub band, i.e., W∗k = (D∗k − Sk )/α, k = 1, 2 (5) 5) Combine the results of Step 4 to obtain the embedded watermark: W∗ = W∗1 +W∗2 . The block diagram representation of the above mentioned procedure of watermark extraction is shown in figure 3. Figure 3: Watermark Extraction c) Sequence Followed The approach mainly dealt with the following items in sequence 1. Representing an image in the form of a Matrix 2. Taking out the Transformation let it be DWT or SVD 3. Embedding the watermark/secret image with the cover image to get the watermarked image 4. Neglecting fine details which also involves in elimination of noise 5. Reconstructing the watermark image from the watermarked image. 6. Calculating the PSNR for various levels of approximations and comparing them. Transformation and Reconstruction DWT performs wavelet decomposition of vector X with respect to a particular wavelet or particular wavelet filters that you specify. Instead of transmitting the original matrix as a whole, proper choice of these coefficients is made out and only selected coefficients are transmitted. The reverse procedure is carried out
  • 5. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 10 | Page while reconstructing the image. The inverse transformation is carried out for each of the available coefficients and the representation matrix is obtained. IDWT carries out Wavelet reconstruction. PSNR (Peak signal to noise ratio) As a measure of the quality of a watermarked image, the peak signal-to noise ratio (PSNR) was used. We use the PSNR as an objective means of performance. PSNR is used to measure the difference between two images. It is defined as PSNR=20* Log10 (b/rms) Where b is the largest possible value of the signal (typically 255 or 1), and rms is the root mean square difference between two images. The PSNR is given in decibel units (dB), which measure the ratio of the peak signal and the difference between two images. An increase of 20 dB corresponds to a ten-fold decrease in the rms difference between two images. There are many versions of signal to noise ratios, but the PSNR is very common in image processing, probably because it gives better sounding numbers than other measures. IV. Result And Performance Analysis 4.1 Result Using DWT Scheme of Watermarking  The cover image and the watermark image to be watermarked are shown in the figure 4 and figure 5 respectively. Figure 4: Original Cover Image Figure 5: Watermark Image  The watermarked image obtained from the DWT scheme is shown in figure 6. Figure 6: Watermarked Image Using DWT  Figure 7 and Figure 8 represents the difference between the original cover image and the watermarked image and key generated respectively.
  • 6. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 11 | Page Figure 7: Difference Image Figure 8: Key Generated  The calculated PSNR values in DWT scheme with different scaling factor (α) are listed in Table 1. Table 1: PSNR values for different scaling factor in DWT scheme 4.2 Result Using SVD Scheme of Watermarking  Figure 9 and figure 10 shows the watermarked image and watermarked with noise image after SVD technique respectively. Figure 9: Watermarked Image Figure 10: Watermarked and Noised Image  The watermark image can be reconstructed from the watermarked image and the recovered watermark image is shown in the figure 11. Figure 11: Recovered Watermark Image  Figure 12, 13, 14 and 15 shows the watermarking of a text file in cover image using SVD scheme of watermarking. α = 0.01 α = 0.05 α = 0.09 40.1538 38.8375 37.0752
  • 7. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 12 | Page Figure 12: Cover image Figure 13: Watermark to be embedded Figure 14: Watermarked image Figure 15: Watermarked and noised image  The watermark text can be reconstructed from the watermarked image. The recovered watermark image is shown in the figure 16. Figure 16: Recovered watermark image  The calculated PSNR values in SVD scheme with different scaling factor (α) are listed in Table 2. Table 2: PSNR values for different scaling factor in SVD scheme 4.3 Result using the hybrid DWT-SVD Scheme of Watermarking  The figures 17 and 18 show the cover image and the gray scale converted image of the cover image used in DWT-SVD scheme of watermarking α = 0.01 α = 0.05 α = 0.09 40.2439 38.9437 37.0012
  • 8. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 13 | Page Figure 17: Cover image Figure 18: Gray scale converted image  The figures 19 and 20 show the watermark image and the gray scale converted image of the watermark image. Figure 19: Cover image Figure 20: Gray scale converted image  The figures 21 and 22 show the SVD image of the cover image and watermarked image after applying DWT-SVD technique. Figure 21: SVD image Figure 22: Watermarked image  The calculated PSNR values in DWT-SVD scheme with different scaling factor (α) are listed in the Table 3. Table 3: PSNR values for different scaling factor in DWT-SVD scheme Here three watermarking schemes namely: Watermarking using DWT, SVD and a hybrid model using DWT & SVD are implemented and compared. Watermark extraction was performed on watermarked images using these three models. The output images and results are observed to compare the performance of these α = 0.01 α = 0.05 α = 0.09 40.4387 39.0513 37.1996
  • 9. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 14 | Page schemes. The values of the scaling factors are taken as 0.01, 0.05 and 0.09 and the results are illustrated in Table 4. WATERMARKING SCHEME PSNR, WITH α =0.01 PSNR, WITH α =0.05 PSNR, WITH α =0.09 DWT 40.1538 38.8375 37.0752 SVD 40.2439 38.9437 37.0012 DWT-SVD 40.4387 39.0513 37.1996 Table 4: Comparison of PSNR for DWT, SVD and Hybrid model DWT-SVD Scheme of Watermarking V. Conclusion Hybrid image watermarking technique based on DWT and SVD has been presented, where the watermark is embedded on the singular values of the cover image’s DWT sub bands. The technique fully exploits the respective feature of these two transform domain methods: Spatio-frequency localization of DWT and SVD efficiently represents intrinsic algebraic properties of an image. The results show that the proposed hybrid DWT-SVD scheme has both the significant improvement in imperceptibility and the robustness. It is observed that the larger the scaling factor, the stronger is the robustness of the applied watermarking scheme and it can withstand a variety of image-processing attacks. In addition to quantitative measurement, the hybrid model has also given better visual perceptions of the extracted watermarks. Thus the DWT-SVD hybrid model watermarking scheme significantly outperforms the other two schemes of watermarking. References [1] G. Bhatnagar and B. Raman, ―A new robust reference watermarking scheme based on DWT-SVD‖,Comput. Standards Interfaces, Sep 2009, vol. 31, no. 5, pp. 1002–1013. [2] J. Sang and M. S. Alam, ― Fragility and robustness of binary-phase-only filter-Based fragile/semi fragile digital image watermarking‖, IEEE Transactions on Instrumentation and Measurement, Mar. 2008, vol. 57, no. 3, pp. 595–606. [3] H.-T. Wu and Y.M. Cheung,― Reversible watermarking by modulation and security enhancement‖, IEEE Trans. Instrum. Meas., Jan. 2010, vol. 59, no. 1, pp. 221–228. [4] V. Aslantas, L. A. Dog˘an, and S. Ozturk, ―DWT-SVD based image watermarking using particle swarm optimizer,‖ in Proc. IEEE Int. Conf. Multimedia Expo, Hannover, Germany, 2008, pp. 241–244. [5] Doerr, G. and J. Dugelay, ―A guided tour to video watermarking. Signal Processing‖, Image Commun., 2003, 18:263-282. [6] Chan, P. and M. Lyu,,‖A DWT-based digital video watermarking scheme with error correcting code‖. Lecture Notes Comput. Sci., 2003.2836: 202-213. DOI: _10 1007/b13930. [7] X.W Kong, Y. Liu, H.J Liu, and D.L Yang, "Object Watermarks for Digital Images and Video", Image and Vision Computing, 2004, Vol. 22, pp.583-595. [8] Chien-Chuan Ko, and Bo-Zhi Yang,‖ An Integrated Technique for Video Watermarking‖, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). [9] J. M. Shieh ,D. C. Lou ,M. C. Chang, ―A Semi-Blind Digital Watermarking Scheme Based on Singular Value Decomposition,‖ Journal of Computer Standards & Interfaces, 2006, vol. 28, no. 4, pp. 428–440. [10] Z. Xinzhong , Z. Jianmin, X. Huiying , ―A Digital Watermarking Algorithm and Implementation Based on Improved SVD,‖ The 18th International Conference on Pattern Recognition (ICPR’06), 2006, vol. 3, pp.651–656. [11] Chang, C., P. Tsai and C. Lin,‖SVD-based digital image watermarking scheme.‖ Patt. Recog. Lett., 26: 1577-1586. DOI:10.1016/j.patrec.2005.01.00411, 2005. [12] R. Liu, and T. Tan, ―An SVD-Based Watermarking Scheme for Protecting Rightful Ownership‖, IEEE Transactions on Multimedia, 2002, vol. 4, pp. 121–128. [13] M Ali and CW Ahn, ―An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain‖, Signal Processing, Elsevier, vol. 94, 2014, pp 545–556. [14] N.M. Makbol, B.E. Khoo,‖ Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition‖, AEU—International Journal of Electronics and Communications, 67 (2) (2013), pp. 102–112. [15] X. Wu, W. Sun,‖ Robust copyright protection scheme for digital images using overlapping DCT and SVD‖, Applied Soft Computing, 13 (2) (2013), pp. 1170–1182.