SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
DOI : 10.5121/ijait.2014.4201 1
AN ADAPTIVE WATERMARKING PROCESS
IN HADAMARD TRANSFORM
PARVATHAVARTHINI S1
SHANTHAKUMARI R2
1
Department of Information Technology, Kongu Engineering College, Perundurai, Erode.
2
Department of Information Technology, Kongu Engineering College, Perundurai, Erode.
ABSTRACT
An adaptive visible/invisible watermarking scheme is done to prevent the privacy and preserving copyright
protection of digital data using Hadamard transform based on the scaling factor of the image. The value of
scaling factor depends on the control parameter. The scaling factor is calculated to embedded the
watermark. Depend upon the control parameter the visible and invisible watermarking is determined. The
proposed Hadamard transform domain method is more robust again image/signal processing attacks.
Furthermore, it also shows that the proposed method confirm the efficiency through various performance
analysis and experimental results.
KEYWORD
Hadamard Transform, visible watermarking, invisible watermarking, scaling factor.
I. INTRODUCTION
With the popularity of Internet communications and the development of multimedia technology,
digital media can be easily duplicated, distributed and tampered. Copyright protection and content
authentication are the problem faced by the digital media. Digital watermarking technique
provides an approach to deal with these problems. Watermarking is the process of inserting data
into a multimedia element such as an image, audio, or video file. The embedded data can be
identified or extracted from the multimedia for identifying the copyright owner. An effective
watermarking scheme should meet certain requirements including transparency, robustness,
security, un-ambiguity, adequate information capacity, low computational complexity and etc.
Figure 1. General watermarking method
Watermarking can be of two types Visible Watermarking and Invisible Watermarking. A visible
watermark is a visible semi-transparent text or image overlaid on the original image. An invisible
watermark is which cannot be perceived with human’s eyes when the image is embedded. Digital
Watermarking mainly involves two phases Watermark embedding, and Watermark extraction.
Digital watermark can be classified into two classes depending on the domain of watermark
embedding spatial domain and transform domain. In the transform domain the properties of the
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
2
underlying domain can be exploited. The transform domain scheme is typically more robustness
towards to noise, common image processing, and compression when compared with the spatial
transform scheme. The two most commonly used methods are Discrete cosine transform (DCT),
Discrete wavelet transform (DWT), Discrete fourier transform, Hadamard transform etc.,
Hadamard transform is consider as the one of the best method because transformation matrix is
always represented in + 1 and -1. The processing time is reduced in this method since it uses only
addition and subtraction operation. It has a good energy compaction property and its
transformation matrix could be generated using fast algorithms and hence it is called Fast
Hadamard Transform (FHT).
2. PROPOSED WORK
In proposed system, adaptive visible/invisible watermarking scheme for digital images is done
through hadamard transform by calculating scaling factor. The value of the scaling factor is based
on control parameter. It can be adjusted to make the watermark scheme as either visible or
invisible. This work consist of three modules,
• Hadamard Transformation
• Watermark Embedding
• Watermark Extraction
2.1 Hadamard transformation
The Hadamard transform (also known as the Walsh–Hadamard transform) is orthogonal
transformation that decomposes a signal into a set of orthogonal, rectangular waveforms called
Walsh -Hadamard transform. It is a non-sinusoidal signal. The 2D-Hadamard transform is mainly
used in image processing and image compression applications.
=
√ −
(1)
The advantages of Hadamard transform include
(i) Its elements are real
(ii) Its rows and columns are orthogonal to each other
Let [I] represents the original image and [ ′
] is the transformed image then the 2D – Hadamard
transform of [I] is given by
[ ′
] =
[ ]
(2)
Figure 2. Process of Hadamard Transform
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
3
2.2. Watermark embedding
After the Hadamard transform, watermark is embedded based on the scaling factor of the cover
image. The cover image to be protected or to be watermarked is transformed into frequency
components using Hadamard transform technique.
µ ( ′
) = ∑ ∑ ′
(a,b) (3)
=
( µ ′
)
(4)
The α can be acquired by multiplying it with inverse multiples of 10 as given in α. The
watermarking scheme is determined by the controlling parameter m and it can take the values
from 0 onwards controls the strength of scaling factor.
α = x (5)
Figure 3. Watermark embedding process
For m=0 the watermark dominates the cover image and destroy the underlying image quality
heavily. For m=1 the visibility of the watermark is good without destroying the underlying
content. For m=2 the watermark become invisible without degrading the quality of underlying
digital image.
2.3. Watermark Extraction
Figure 4. Watermark extraction Process
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
3
2.2. Watermark embedding
After the Hadamard transform, watermark is embedded based on the scaling factor of the cover
image. The cover image to be protected or to be watermarked is transformed into frequency
components using Hadamard transform technique.
µ ( ′
) = ∑ ∑ ′
(a,b) (3)
=
( µ ′
)
(4)
The α can be acquired by multiplying it with inverse multiples of 10 as given in α. The
watermarking scheme is determined by the controlling parameter m and it can take the values
from 0 onwards controls the strength of scaling factor.
α = x (5)
Figure 3. Watermark embedding process
For m=0 the watermark dominates the cover image and destroy the underlying image quality
heavily. For m=1 the visibility of the watermark is good without destroying the underlying
content. For m=2 the watermark become invisible without degrading the quality of underlying
digital image.
2.3. Watermark Extraction
Figure 4. Watermark extraction Process
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
3
2.2. Watermark embedding
After the Hadamard transform, watermark is embedded based on the scaling factor of the cover
image. The cover image to be protected or to be watermarked is transformed into frequency
components using Hadamard transform technique.
µ ( ′
) = ∑ ∑ ′
(a,b) (3)
=
( µ ′
)
(4)
The α can be acquired by multiplying it with inverse multiples of 10 as given in α. The
watermarking scheme is determined by the controlling parameter m and it can take the values
from 0 onwards controls the strength of scaling factor.
α = x (5)
Figure 3. Watermark embedding process
For m=0 the watermark dominates the cover image and destroy the underlying image quality
heavily. For m=1 the visibility of the watermark is good without destroying the underlying
content. For m=2 the watermark become invisible without degrading the quality of underlying
digital image.
2.3. Watermark Extraction
Figure 4. Watermark extraction Process
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
4
The given original cover image and watermarked image are taken as input and converted into
YUV color space. Hadamard transformation technique is applied on the luminance channel of
cover image and watermarked image. Hadamard transformed cover image is used to calculate the
scaling factor and watermark is extracted.
Table 1 Calculated scaling factor for sample cover images
3. PERFORMANCE ANALYSIS
The performance for an adaptive visible/invisible watermarking scheme have been evaluated and
compared on the basis of two measures: Universal Image Quality Index (UIQI), and Structural
Similarity (SSIM) they are computed as follows
3.1. Universal Image Quality Index
It is another metric for measuring the quality of watermarked image. It is designed to model
image distortion using three factors namely loss of correlation, luminance distortion and contrast
distortion. For any two images x and y,the UIQI is given is
(5)
[I] [II] [III]
Where,
[I] - correlation between x and y and is in the range between [-1,1]
[II] - closeness of luminance is between x and y range is [0,1]
[III] - similarity of contrast between x and y and is in the range of [0,1]
The universal image quality index Q lies in the range [-1, 1] where 1 indicate that x and y are
similar and -1 represents the dissimilarity.
3.2. Structural Similarity index
It is regularly used metric for measuring the similarity between two images. It is defined as
(6)
Where,
µ - the average of x
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
4
The given original cover image and watermarked image are taken as input and converted into
YUV color space. Hadamard transformation technique is applied on the luminance channel of
cover image and watermarked image. Hadamard transformed cover image is used to calculate the
scaling factor and watermark is extracted.
Table 1 Calculated scaling factor for sample cover images
3. PERFORMANCE ANALYSIS
The performance for an adaptive visible/invisible watermarking scheme have been evaluated and
compared on the basis of two measures: Universal Image Quality Index (UIQI), and Structural
Similarity (SSIM) they are computed as follows
3.1. Universal Image Quality Index
It is another metric for measuring the quality of watermarked image. It is designed to model
image distortion using three factors namely loss of correlation, luminance distortion and contrast
distortion. For any two images x and y,the UIQI is given is
(5)
[I] [II] [III]
Where,
[I] - correlation between x and y and is in the range between [-1,1]
[II] - closeness of luminance is between x and y range is [0,1]
[III] - similarity of contrast between x and y and is in the range of [0,1]
The universal image quality index Q lies in the range [-1, 1] where 1 indicate that x and y are
similar and -1 represents the dissimilarity.
3.2. Structural Similarity index
It is regularly used metric for measuring the similarity between two images. It is defined as
(6)
Where,
µ - the average of x
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
4
The given original cover image and watermarked image are taken as input and converted into
YUV color space. Hadamard transformation technique is applied on the luminance channel of
cover image and watermarked image. Hadamard transformed cover image is used to calculate the
scaling factor and watermark is extracted.
Table 1 Calculated scaling factor for sample cover images
3. PERFORMANCE ANALYSIS
The performance for an adaptive visible/invisible watermarking scheme have been evaluated and
compared on the basis of two measures: Universal Image Quality Index (UIQI), and Structural
Similarity (SSIM) they are computed as follows
3.1. Universal Image Quality Index
It is another metric for measuring the quality of watermarked image. It is designed to model
image distortion using three factors namely loss of correlation, luminance distortion and contrast
distortion. For any two images x and y,the UIQI is given is
(5)
[I] [II] [III]
Where,
[I] - correlation between x and y and is in the range between [-1,1]
[II] - closeness of luminance is between x and y range is [0,1]
[III] - similarity of contrast between x and y and is in the range of [0,1]
The universal image quality index Q lies in the range [-1, 1] where 1 indicate that x and y are
similar and -1 represents the dissimilarity.
3.2. Structural Similarity index
It is regularly used metric for measuring the similarity between two images. It is defined as
(6)
Where,
µ - the average of x
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
5
µ - the average of y
- the variance of x
- the variance of y
- the covariance of x and y
= - constant to avoid instability where µ + µ is close to zero; = 0.01, = 225
= - constant to avoid instability where + is close to zero; = 0.01, = 225
4. RESULTS AND DISCUSSION
In this part experimental and performance analysis results are given with detail. The proposed
work is implemented on Intel dual core with 1GB RAM configured using MATLAB R2012a.The
most commonly used test Images are taken for experimentation.
Figure 5. Watermark image
Figure 6. UIQI based evaluation for visible and invisible watermarked images.
Figure 7. Obtained SSIM value for different sample values and compared with yang et al’s method.
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
6
(a) Watermarked Lena α = 0.5005 (b) Watermarked F-16 α = 0.5006
Figure 8. Watermark sample images for controlling parameter for m=0
(a) Watermarked Lena α = 0.05000 (b) Watermarked F-16 α = 0.0500
Figure 9. Watermark sample images for controlling parameter for m=1
(a)Watermarked Lena α = 0.005 (b) Watermarked Lena α = 0.00500
Figure 10. Watermark sample images for controlling parameter for m=2
Table 2 UIQI based evaluation for visible and invisible watermarked image
Sample Cover Images UIQI value for
m = 0
UIQI value for
m = 1
UIQI value for
m = 2
F-16 0.49463 0.87020 0.96492
Lena 0.47377 0.87246 0.96774
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014
7
Table 3 Comparison of obtained SSIM values with results yang et al.’s method
Sample Cover
Images
Yang et al.’s
Method
SSIM Value for
m = 0
SSIM Value
For m = 1
F-16 0.93 0.51154 0.49031
Lena 0.97 0.94586 0.94374
5. CONCLUSION
An adaptive watermarking method based on embedding and extracting a digital watermark
into/from an image is done using a hadamard transform. Hadamard transform is mainly used for
its robustness against image processing attacks. In this method an adaptive procedure for
calculating scaling factor or scaling strength is used in hadamard transform. The scaling factor
value is controlled by a control parameter. As per the users’ requirements the inserted watermark
may be either visible/invisible based on the control parameter. The results are compared with the
existing system. The proposed scheme confirms the efficiency by the experimental result and
performance analysis.
References
[1] Anthony T.S.Ho,Jun Shen,Soon Hie Tan,Alexc.Kot (2002), ‘Digital image-in-image watermarking
for copyright protection of satellite images using the fast Hadamard transform’. IEEE International
symposium on geoscience and remote sensing, p. 3311e3.
[2] Anthony T.S.Ho,Jun Shen,Andrew K.K.Chow,Jerry Woon (2003), ‘Robust digital image-in-image
watermarking algorithm using the fast Hadamard transform’.International symposium on optical
science and technology. International Society for Optics and Photonics. p. 76e85.
[3] Biao – Bing Huang, Shao – Xian Tang (2006), ‘A contrast-sensitive visible watermarking scheme’.
IEEE Transactions on Multimedia Vol.13, No.2, p.60e6.
[4] Santhi V,Arulmozhivarvarman P (2013), ‘Hadamard transform based adaptive visible/invisible
watermarking scheme for digital images’, Information Security Technical Report Vol.01,No.001.,in
press.
[5] Saraju P. Mohanty , Bhargava K.Bhargava (2008), ‘Invisible watermarking based on creation and
robust insertion-extraction of image adaptive watermarks’. ACM Transactions on Multimedia
Computing Vol.5, No.2, and p.12:1e12:22.
[6] Ying Yang ,Xingming Sun ,Hengfu Yang ,Chan-Tsun Li,and Rong Xiao (2009), ‘A contrast-sensitive
reversible visible image watermarking technique’. IEEE Transactions on Circuits and Systems Vol.19
No.5, p.656e67.
[7] Zhou Wang, Alan Conrad Bovik, Hamid Rahim Sheikh,Eero p. Simoncelli (2004), ‘Image Quality
Assessment: from error visibility to structural similarity’. IEEE Transactions on Image Processing
Vol.13, No.4, p.600e12.

More Related Content

What's hot

A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDHybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDCSCJournals
 
IRJET - Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
IRJET -  	  Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...IRJET -  	  Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
IRJET - Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...IRJET Journal
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...IRJET Journal
 
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...TELKOMNIKA JOURNAL
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATIONMULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATIONprj_publication
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsIJORCS
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Emotion and Gender Classification in Real-Time
IRJET- Emotion and Gender Classification in Real-TimeIRJET- Emotion and Gender Classification in Real-Time
IRJET- Emotion and Gender Classification in Real-TimeIRJET Journal
 
IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...
IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...
IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...IRJET Journal
 

What's hot (17)

A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDHybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
 
IRJET - Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
IRJET -  	  Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...IRJET -  	  Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
IRJET - Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
 
E017263040
E017263040E017263040
E017263040
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...
 
H3602056060
H3602056060H3602056060
H3602056060
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATIONMULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
MULTI WAVELET BASED IMAGE COMPRESSION FOR TELE MEDICAL APPLICATION
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression Algorithms
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 
IRJET- Emotion and Gender Classification in Real-Time
IRJET- Emotion and Gender Classification in Real-TimeIRJET- Emotion and Gender Classification in Real-Time
IRJET- Emotion and Gender Classification in Real-Time
 
IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...
IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...
IRJET- Improving Interpretability of an Underwater using Undecimated Wavelet ...
 

Similar to An adaptive watermarking process in hadamard transform

Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformIRJET Journal
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainIRJET Journal
 

Similar to An adaptive watermarking process in hadamard transform (20)

A0360105
A0360105A0360105
A0360105
 
K1803015864
K1803015864K1803015864
K1803015864
 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
1820 1824
1820 18241820 1824
1820 1824
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

An adaptive watermarking process in hadamard transform

  • 1. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 DOI : 10.5121/ijait.2014.4201 1 AN ADAPTIVE WATERMARKING PROCESS IN HADAMARD TRANSFORM PARVATHAVARTHINI S1 SHANTHAKUMARI R2 1 Department of Information Technology, Kongu Engineering College, Perundurai, Erode. 2 Department of Information Technology, Kongu Engineering College, Perundurai, Erode. ABSTRACT An adaptive visible/invisible watermarking scheme is done to prevent the privacy and preserving copyright protection of digital data using Hadamard transform based on the scaling factor of the image. The value of scaling factor depends on the control parameter. The scaling factor is calculated to embedded the watermark. Depend upon the control parameter the visible and invisible watermarking is determined. The proposed Hadamard transform domain method is more robust again image/signal processing attacks. Furthermore, it also shows that the proposed method confirm the efficiency through various performance analysis and experimental results. KEYWORD Hadamard Transform, visible watermarking, invisible watermarking, scaling factor. I. INTRODUCTION With the popularity of Internet communications and the development of multimedia technology, digital media can be easily duplicated, distributed and tampered. Copyright protection and content authentication are the problem faced by the digital media. Digital watermarking technique provides an approach to deal with these problems. Watermarking is the process of inserting data into a multimedia element such as an image, audio, or video file. The embedded data can be identified or extracted from the multimedia for identifying the copyright owner. An effective watermarking scheme should meet certain requirements including transparency, robustness, security, un-ambiguity, adequate information capacity, low computational complexity and etc. Figure 1. General watermarking method Watermarking can be of two types Visible Watermarking and Invisible Watermarking. A visible watermark is a visible semi-transparent text or image overlaid on the original image. An invisible watermark is which cannot be perceived with human’s eyes when the image is embedded. Digital Watermarking mainly involves two phases Watermark embedding, and Watermark extraction. Digital watermark can be classified into two classes depending on the domain of watermark embedding spatial domain and transform domain. In the transform domain the properties of the
  • 2. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 2 underlying domain can be exploited. The transform domain scheme is typically more robustness towards to noise, common image processing, and compression when compared with the spatial transform scheme. The two most commonly used methods are Discrete cosine transform (DCT), Discrete wavelet transform (DWT), Discrete fourier transform, Hadamard transform etc., Hadamard transform is consider as the one of the best method because transformation matrix is always represented in + 1 and -1. The processing time is reduced in this method since it uses only addition and subtraction operation. It has a good energy compaction property and its transformation matrix could be generated using fast algorithms and hence it is called Fast Hadamard Transform (FHT). 2. PROPOSED WORK In proposed system, adaptive visible/invisible watermarking scheme for digital images is done through hadamard transform by calculating scaling factor. The value of the scaling factor is based on control parameter. It can be adjusted to make the watermark scheme as either visible or invisible. This work consist of three modules, • Hadamard Transformation • Watermark Embedding • Watermark Extraction 2.1 Hadamard transformation The Hadamard transform (also known as the Walsh–Hadamard transform) is orthogonal transformation that decomposes a signal into a set of orthogonal, rectangular waveforms called Walsh -Hadamard transform. It is a non-sinusoidal signal. The 2D-Hadamard transform is mainly used in image processing and image compression applications. = √ − (1) The advantages of Hadamard transform include (i) Its elements are real (ii) Its rows and columns are orthogonal to each other Let [I] represents the original image and [ ′ ] is the transformed image then the 2D – Hadamard transform of [I] is given by [ ′ ] = [ ] (2) Figure 2. Process of Hadamard Transform
  • 3. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 3 2.2. Watermark embedding After the Hadamard transform, watermark is embedded based on the scaling factor of the cover image. The cover image to be protected or to be watermarked is transformed into frequency components using Hadamard transform technique. µ ( ′ ) = ∑ ∑ ′ (a,b) (3) = ( µ ′ ) (4) The α can be acquired by multiplying it with inverse multiples of 10 as given in α. The watermarking scheme is determined by the controlling parameter m and it can take the values from 0 onwards controls the strength of scaling factor. α = x (5) Figure 3. Watermark embedding process For m=0 the watermark dominates the cover image and destroy the underlying image quality heavily. For m=1 the visibility of the watermark is good without destroying the underlying content. For m=2 the watermark become invisible without degrading the quality of underlying digital image. 2.3. Watermark Extraction Figure 4. Watermark extraction Process International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 3 2.2. Watermark embedding After the Hadamard transform, watermark is embedded based on the scaling factor of the cover image. The cover image to be protected or to be watermarked is transformed into frequency components using Hadamard transform technique. µ ( ′ ) = ∑ ∑ ′ (a,b) (3) = ( µ ′ ) (4) The α can be acquired by multiplying it with inverse multiples of 10 as given in α. The watermarking scheme is determined by the controlling parameter m and it can take the values from 0 onwards controls the strength of scaling factor. α = x (5) Figure 3. Watermark embedding process For m=0 the watermark dominates the cover image and destroy the underlying image quality heavily. For m=1 the visibility of the watermark is good without destroying the underlying content. For m=2 the watermark become invisible without degrading the quality of underlying digital image. 2.3. Watermark Extraction Figure 4. Watermark extraction Process International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 3 2.2. Watermark embedding After the Hadamard transform, watermark is embedded based on the scaling factor of the cover image. The cover image to be protected or to be watermarked is transformed into frequency components using Hadamard transform technique. µ ( ′ ) = ∑ ∑ ′ (a,b) (3) = ( µ ′ ) (4) The α can be acquired by multiplying it with inverse multiples of 10 as given in α. The watermarking scheme is determined by the controlling parameter m and it can take the values from 0 onwards controls the strength of scaling factor. α = x (5) Figure 3. Watermark embedding process For m=0 the watermark dominates the cover image and destroy the underlying image quality heavily. For m=1 the visibility of the watermark is good without destroying the underlying content. For m=2 the watermark become invisible without degrading the quality of underlying digital image. 2.3. Watermark Extraction Figure 4. Watermark extraction Process
  • 4. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 4 The given original cover image and watermarked image are taken as input and converted into YUV color space. Hadamard transformation technique is applied on the luminance channel of cover image and watermarked image. Hadamard transformed cover image is used to calculate the scaling factor and watermark is extracted. Table 1 Calculated scaling factor for sample cover images 3. PERFORMANCE ANALYSIS The performance for an adaptive visible/invisible watermarking scheme have been evaluated and compared on the basis of two measures: Universal Image Quality Index (UIQI), and Structural Similarity (SSIM) they are computed as follows 3.1. Universal Image Quality Index It is another metric for measuring the quality of watermarked image. It is designed to model image distortion using three factors namely loss of correlation, luminance distortion and contrast distortion. For any two images x and y,the UIQI is given is (5) [I] [II] [III] Where, [I] - correlation between x and y and is in the range between [-1,1] [II] - closeness of luminance is between x and y range is [0,1] [III] - similarity of contrast between x and y and is in the range of [0,1] The universal image quality index Q lies in the range [-1, 1] where 1 indicate that x and y are similar and -1 represents the dissimilarity. 3.2. Structural Similarity index It is regularly used metric for measuring the similarity between two images. It is defined as (6) Where, µ - the average of x International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 4 The given original cover image and watermarked image are taken as input and converted into YUV color space. Hadamard transformation technique is applied on the luminance channel of cover image and watermarked image. Hadamard transformed cover image is used to calculate the scaling factor and watermark is extracted. Table 1 Calculated scaling factor for sample cover images 3. PERFORMANCE ANALYSIS The performance for an adaptive visible/invisible watermarking scheme have been evaluated and compared on the basis of two measures: Universal Image Quality Index (UIQI), and Structural Similarity (SSIM) they are computed as follows 3.1. Universal Image Quality Index It is another metric for measuring the quality of watermarked image. It is designed to model image distortion using three factors namely loss of correlation, luminance distortion and contrast distortion. For any two images x and y,the UIQI is given is (5) [I] [II] [III] Where, [I] - correlation between x and y and is in the range between [-1,1] [II] - closeness of luminance is between x and y range is [0,1] [III] - similarity of contrast between x and y and is in the range of [0,1] The universal image quality index Q lies in the range [-1, 1] where 1 indicate that x and y are similar and -1 represents the dissimilarity. 3.2. Structural Similarity index It is regularly used metric for measuring the similarity between two images. It is defined as (6) Where, µ - the average of x International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 4 The given original cover image and watermarked image are taken as input and converted into YUV color space. Hadamard transformation technique is applied on the luminance channel of cover image and watermarked image. Hadamard transformed cover image is used to calculate the scaling factor and watermark is extracted. Table 1 Calculated scaling factor for sample cover images 3. PERFORMANCE ANALYSIS The performance for an adaptive visible/invisible watermarking scheme have been evaluated and compared on the basis of two measures: Universal Image Quality Index (UIQI), and Structural Similarity (SSIM) they are computed as follows 3.1. Universal Image Quality Index It is another metric for measuring the quality of watermarked image. It is designed to model image distortion using three factors namely loss of correlation, luminance distortion and contrast distortion. For any two images x and y,the UIQI is given is (5) [I] [II] [III] Where, [I] - correlation between x and y and is in the range between [-1,1] [II] - closeness of luminance is between x and y range is [0,1] [III] - similarity of contrast between x and y and is in the range of [0,1] The universal image quality index Q lies in the range [-1, 1] where 1 indicate that x and y are similar and -1 represents the dissimilarity. 3.2. Structural Similarity index It is regularly used metric for measuring the similarity between two images. It is defined as (6) Where, µ - the average of x
  • 5. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 5 µ - the average of y - the variance of x - the variance of y - the covariance of x and y = - constant to avoid instability where µ + µ is close to zero; = 0.01, = 225 = - constant to avoid instability where + is close to zero; = 0.01, = 225 4. RESULTS AND DISCUSSION In this part experimental and performance analysis results are given with detail. The proposed work is implemented on Intel dual core with 1GB RAM configured using MATLAB R2012a.The most commonly used test Images are taken for experimentation. Figure 5. Watermark image Figure 6. UIQI based evaluation for visible and invisible watermarked images. Figure 7. Obtained SSIM value for different sample values and compared with yang et al’s method.
  • 6. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 6 (a) Watermarked Lena α = 0.5005 (b) Watermarked F-16 α = 0.5006 Figure 8. Watermark sample images for controlling parameter for m=0 (a) Watermarked Lena α = 0.05000 (b) Watermarked F-16 α = 0.0500 Figure 9. Watermark sample images for controlling parameter for m=1 (a)Watermarked Lena α = 0.005 (b) Watermarked Lena α = 0.00500 Figure 10. Watermark sample images for controlling parameter for m=2 Table 2 UIQI based evaluation for visible and invisible watermarked image Sample Cover Images UIQI value for m = 0 UIQI value for m = 1 UIQI value for m = 2 F-16 0.49463 0.87020 0.96492 Lena 0.47377 0.87246 0.96774
  • 7. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 2, April 2014 7 Table 3 Comparison of obtained SSIM values with results yang et al.’s method Sample Cover Images Yang et al.’s Method SSIM Value for m = 0 SSIM Value For m = 1 F-16 0.93 0.51154 0.49031 Lena 0.97 0.94586 0.94374 5. CONCLUSION An adaptive watermarking method based on embedding and extracting a digital watermark into/from an image is done using a hadamard transform. Hadamard transform is mainly used for its robustness against image processing attacks. In this method an adaptive procedure for calculating scaling factor or scaling strength is used in hadamard transform. The scaling factor value is controlled by a control parameter. As per the users’ requirements the inserted watermark may be either visible/invisible based on the control parameter. The results are compared with the existing system. The proposed scheme confirms the efficiency by the experimental result and performance analysis. References [1] Anthony T.S.Ho,Jun Shen,Soon Hie Tan,Alexc.Kot (2002), ‘Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform’. IEEE International symposium on geoscience and remote sensing, p. 3311e3. [2] Anthony T.S.Ho,Jun Shen,Andrew K.K.Chow,Jerry Woon (2003), ‘Robust digital image-in-image watermarking algorithm using the fast Hadamard transform’.International symposium on optical science and technology. International Society for Optics and Photonics. p. 76e85. [3] Biao – Bing Huang, Shao – Xian Tang (2006), ‘A contrast-sensitive visible watermarking scheme’. IEEE Transactions on Multimedia Vol.13, No.2, p.60e6. [4] Santhi V,Arulmozhivarvarman P (2013), ‘Hadamard transform based adaptive visible/invisible watermarking scheme for digital images’, Information Security Technical Report Vol.01,No.001.,in press. [5] Saraju P. Mohanty , Bhargava K.Bhargava (2008), ‘Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks’. ACM Transactions on Multimedia Computing Vol.5, No.2, and p.12:1e12:22. [6] Ying Yang ,Xingming Sun ,Hengfu Yang ,Chan-Tsun Li,and Rong Xiao (2009), ‘A contrast-sensitive reversible visible image watermarking technique’. IEEE Transactions on Circuits and Systems Vol.19 No.5, p.656e67. [7] Zhou Wang, Alan Conrad Bovik, Hamid Rahim Sheikh,Eero p. Simoncelli (2004), ‘Image Quality Assessment: from error visibility to structural similarity’. IEEE Transactions on Image Processing Vol.13, No.4, p.600e12.