SlideShare a Scribd company logo
1 of 2
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 424
A NEW WATERMARKING SCHME AGAINST LOCAL ATTACKS
Neethu Raveendran.K1
1
PG Student, Department of Computer Science and Engineering Specialization in Information System, Federal Institute of
Science and Technology, Kerala, India
Abstract
Many watermarking schemes are robust against common image processing attacks like Rotation Scaling Translation (RST) attack. In
this paper, presents a blind watermarking scheme against local attacks. First, proposes a new globally and locally feature transform
called Local Daisy feature transform (LDFT). Then, partition this invariant geometric space using Binary Space Partition Tree (BSP).
The location of every single pixel is in variable to geometrical distortions like rotation, scaling, translation and resistant against
cropping. Lastly, Logarithmic quantization index modulation (LQIM) watermarking embedding method is used to embed
watermarking sequence bit by bit into leaf nodes of binary space partition tree. This method overcomes the drawbacks of feature
based watermarking method. The watermark Extraction is similar to Watermark Embedding. In Extraction process also LDFT space
is created and partitioned using BSP tree.
Keywords: Binary Space Partition tree, Local Daisy feature transform, Logarithmic quantization index modulation
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Digital watermarking is a process of embedding information
into digital multimedia, so that information can be detected for
various purposes. In the past ten years, attacks against image
watermarking system have become increasingly complicated
with the development of watermarking techniques. Every
geometric attack is defined by a set of parameters that
determines the operation performed over the target image (for
example, a rotation angle applied to the sampling grid
characterizes a rotation attack). An affine transformation
preserves lines and parallelism. In cropping, the attacker
extracts a certain region of interest of the image while
discarding the other portions. Obviously, we can’t invert
cropping because it incurs a permanent loss of information
about the discarded pixels. Attacks can be classified into two
categories: global and local. A global transformation is an
operation uniquely defined by a set of operational parameters
and performed over an image’s entire set of pixels, that is, the
same operation, under the same parameters, affects all of the
image pixels. On the other hand, localized transformations
affect subsets of the image, allowing an attacker to apply
distinct operations under different parameters over each image
subset.
Global attacks include Rotation, Scaling and Translation
(RST) attack, Linear Geometric Transform, shearing and other
affine transforms. The parameters of global attack are not
complicated. There are many countermeasures are available
for global attacks. M. Barni proposed an exhaustive search for
the watermark in the space including a set of acceptable attack
parameters [1]. Ruanaidh and Pun proposed Fourier–Mellin
transform which is invariant to global RST transformation [2].
Image normalization algorithm achieves its robustness by both
embedding and detecting the watermark message in the
normalized image [3]. Another countermeasure is a blind
watermarking scheme using geometrically invariant image
features. The detection of the watermark can be conducted
with the help of image features [4]. Local attacks include
Random Bending Attack, C-LPCD (Constrained Local
Permutation with Cancelation and Duplication) etc. Very few
schemes are available against local attacks.
In this paper, presents a blind watermarking scheme against
local attacks. A new globally and locally feature transform
called Local Daisy feature transform. Then, partition this
invariant geometric space using Binary Space Partition Tree.
The location of every single pixel is in variable to geometrical
distortions like rotation, scaling, translation and resistant
against cropping. Lastly, Logarithmic quantization index
modulation watermarking embedding method is used to
embed watermarking sequence bit by bit into leaf nodes of
binary space partition tree.
2. SYSTEM ARCHITECTURE
The watermark embedding process consists of three main
steps: 1) constructing the feature space with Local Daisy
Feature Transform; 2) partitioning the LDFT space with the
Binary Space Partition tree; and 3) embedding watermark
information by Logarithmic Quantization Index Modulation
watermark embedding method. The watermark extracting
process resembles watermark embedding, which comprises
three main steps: 1) constructing the feature space of LDFT;
2) partitioning the LDFT space with the BSP tree; and 3)
watermark extraction. The proposed watermarking scheme is a
blind watermarking scheme.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 425
Fig -1: System Architecture
3. PHASES
There are four phases which are listed below
 Proposed LDFT
 Partitioning LDFT space using BSP tree
 Watermark embedding
 Watermark Extraction
3.1 Proposed LDFT
Most Of the watermarking schemes are robust against global
attacks. A new invariant feature transform called Local daisy
Feature Transform is proposed in this section. LDFT is based
in daisy descriptor [5]. Daisy descriptor is not RST in variant.
But this LDFT is not only globally but also locally invariant.
In order to create LDFT there are several steps. Initially we
need to compute the characteristic scale map of the image.
LoG operator is used to obtain the characteristics scale map of
the image. This scale map varies with respect to image
scaling. Then compute orientation map in every quantized
direction this orientation map is then convolved with Gaussian
Kernels of different standard deviation. After this convolution
we get convolved orientation maps. Then normalize the
convolved orientation maps. Now compute the Euclidean
distance between normalized vector and the original vector.
Finally assign a consistent orientation to each pixel based on
image properties. Orientation assignment is done using
Histogram of oriented gradients (HOG) [6].
3.2 Partitioning LDFT Space using BSP Tree
In this section we are partitioning the geometrically invariant
LDFT space using BSP tree [7]. BSP tree construction is a
process which takes a subspace and partitions it by any hyper
plane that intersects the interior of that subspace. It generates
two new subspaces that can be further partitioned by recursive
processes. Initially we select a partition plane to divide the
LDFT space. To improve the security we can randomize the
order of the selection of the partition plane using a secret key.
In order to achieve a balanced BSP tree, set a threshold value.
The threshold value is computed as the average values of all
the partition planes of the image. Then partition the space
using the plane. If the subset is under the partition plane and
the value of the feature vector is less than threshold value, the
subset is the left child of tree, else right child of tree. This
process continues until the no of leaf nodes is equal to the
length of the watermark sequence.
3.3 Watermark Embedding
Watermarking Sequence is embedded bit by bit into leaf node
from left to right using Logarithmic Quantization Index
Modulation (LIQM) [8]. Initially, using a compression
function the host signal is transformed into logarithmic
domain. The watermark data is embedded using uniform
quantization. Then using the inverse function, the quantized
signal is transformed into the original domain
3.4 Watermark Extraction
Extraction is similar to embedding. Initially create the LDFT
space and partition it using BSP tree. Now determine the
embedded watermark bit using Euclidean distance decoder.
4. CONCLUSIONS
A new watermarking scheme against local attack is proposed.
Initially a new feature transform called Local Daisy feature
transforms is proposed. LDFT is inspired by daisy descriptor.
LDFT is invariant to geometrical attacks. Then LDFT space is
partitioned using BSP trees. Watermark bits are embedded
using Logarithmic quantization index modulation method.
REFERENCES
[1]. M. Barni, “Effectiveness of exhaustive search and
template matching against watermark desynchronization”,
IEEE Signal Process, vol 12 no.2, Feb 2005
[2]. J. Ruanaidh and T. Pun, “Rotation, scale and translation
invariant spread spectrum digital image watermarking”, signal
process, vol.66, no.3, May 1998
[3]. P. Dong, J.G Brankov, N.P. Galatsanos, Y.Yang, and F.
Davoine, “digital watermarking robust to geometric
distortion” IEEE Trans, Image Process,. Vol.11 no.9, Sep
2002
[4]. P. Bas, J. Chassey and B. Macq, “Geometrically invariant
watermarking using feature points”, IEEE Trans, Image
Process, vol.51, no. , apr 2003.
[5]. E. Tola, V. Lepetit and P.Fua,”Daisy: An efficient dense
descriptor applied to wide-baseline stereo”, IEEE Trans.
Pattern Anal. Mach. Intell, vol 32,no5,may 2010
[6]. N.Dalal and B. Triggs, “Histogramof oriented gradients
for human detection” in Proc IEEE Comput. Soc. Conf.
Comput. Vis In Pattern Recognition, June 2005
[7]. M.Abrash,”BSP Trees”,Dr.Dobbs sourcebook, vol 20,
may 1995
[8]. N.K. Kalantari and S.M Ahadi, “a logarithmic
quantization index modulation for perceptually better data
hiding”, IEEE Trans. Image Processing, vol 19, june 2010

More Related Content

What's hot

Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Habibur Rahman
 
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGES
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGESREGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGES
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGES
ADEIJ Journal
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusion
Umed Paliwal
 

What's hot (19)

Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical Review
 
Image analysis basics and principles
Image analysis basics and principlesImage analysis basics and principles
Image analysis basics and principles
 
Cm31588593
Cm31588593Cm31588593
Cm31588593
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
 
Mn3621372142
Mn3621372142Mn3621372142
Mn3621372142
 
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGES
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGESREGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGES
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGES
 
An efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithmAn efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithm
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
Supervised and unsupervised classification techniques for satellite imagery i...
Supervised and unsupervised classification techniques for satellite imagery i...Supervised and unsupervised classification techniques for satellite imagery i...
Supervised and unsupervised classification techniques for satellite imagery i...
 
B0141020
B0141020B0141020
B0141020
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 
Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusion
 
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videosDochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
 
Sub-windowed laser speckle image velocimetry by fast fourier transform techni...
Sub-windowed laser speckle image velocimetry by fast fourier transform techni...Sub-windowed laser speckle image velocimetry by fast fourier transform techni...
Sub-windowed laser speckle image velocimetry by fast fourier transform techni...
 
557 480-486
557 480-486557 480-486
557 480-486
 
Image Registration using NSCT and Invariant Moment
Image Registration using NSCT and Invariant MomentImage Registration using NSCT and Invariant Moment
Image Registration using NSCT and Invariant Moment
 

Similar to A new watermarking schme against local attacks

Matlab ldft-based watermarking resilient to local desynchronization attacks
Matlab  ldft-based watermarking resilient to local desynchronization attacksMatlab  ldft-based watermarking resilient to local desynchronization attacks
Matlab ldft-based watermarking resilient to local desynchronization attacks
Ecway Technologies
 
Ldft based watermarking resilient to local desynchronization attacks
Ldft based watermarking resilient to local desynchronization attacksLdft based watermarking resilient to local desynchronization attacks
Ldft based watermarking resilient to local desynchronization attacks
Ecway Technologies
 
A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...
A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...
A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...
IJLT EMAS
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
Editor IJARCET
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
Editor IJARCET
 

Similar to A new watermarking schme against local attacks (20)

A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
Satellite image resolution enhancement using multi
Satellite image resolution enhancement using multiSatellite image resolution enhancement using multi
Satellite image resolution enhancement using multi
 
Matlab ldft-based watermarking resilient to local desynchronization attacks
Matlab  ldft-based watermarking resilient to local desynchronization attacksMatlab  ldft-based watermarking resilient to local desynchronization attacks
Matlab ldft-based watermarking resilient to local desynchronization attacks
 
Ldft based watermarking resilient to local desynchronization attacks
Ldft based watermarking resilient to local desynchronization attacksLdft based watermarking resilient to local desynchronization attacks
Ldft based watermarking resilient to local desynchronization attacks
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
 
A Review On Single Image Depth Prediction with Wavelet Decomposition
A Review On Single Image Depth Prediction with Wavelet DecompositionA Review On Single Image Depth Prediction with Wavelet Decomposition
A Review On Single Image Depth Prediction with Wavelet Decomposition
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
Neural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlcNeural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlc
 
Neural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlcNeural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlc
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Human action recognition using local space time features and adaboost svm
Human action recognition using local space time features and adaboost svmHuman action recognition using local space time features and adaboost svm
Human action recognition using local space time features and adaboost svm
 
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...
A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...
A New Approach for Multi Index Automatic Change Detection in HR Remotely Sens...
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

A new watermarking schme against local attacks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 424 A NEW WATERMARKING SCHME AGAINST LOCAL ATTACKS Neethu Raveendran.K1 1 PG Student, Department of Computer Science and Engineering Specialization in Information System, Federal Institute of Science and Technology, Kerala, India Abstract Many watermarking schemes are robust against common image processing attacks like Rotation Scaling Translation (RST) attack. In this paper, presents a blind watermarking scheme against local attacks. First, proposes a new globally and locally feature transform called Local Daisy feature transform (LDFT). Then, partition this invariant geometric space using Binary Space Partition Tree (BSP). The location of every single pixel is in variable to geometrical distortions like rotation, scaling, translation and resistant against cropping. Lastly, Logarithmic quantization index modulation (LQIM) watermarking embedding method is used to embed watermarking sequence bit by bit into leaf nodes of binary space partition tree. This method overcomes the drawbacks of feature based watermarking method. The watermark Extraction is similar to Watermark Embedding. In Extraction process also LDFT space is created and partitioned using BSP tree. Keywords: Binary Space Partition tree, Local Daisy feature transform, Logarithmic quantization index modulation ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Digital watermarking is a process of embedding information into digital multimedia, so that information can be detected for various purposes. In the past ten years, attacks against image watermarking system have become increasingly complicated with the development of watermarking techniques. Every geometric attack is defined by a set of parameters that determines the operation performed over the target image (for example, a rotation angle applied to the sampling grid characterizes a rotation attack). An affine transformation preserves lines and parallelism. In cropping, the attacker extracts a certain region of interest of the image while discarding the other portions. Obviously, we can’t invert cropping because it incurs a permanent loss of information about the discarded pixels. Attacks can be classified into two categories: global and local. A global transformation is an operation uniquely defined by a set of operational parameters and performed over an image’s entire set of pixels, that is, the same operation, under the same parameters, affects all of the image pixels. On the other hand, localized transformations affect subsets of the image, allowing an attacker to apply distinct operations under different parameters over each image subset. Global attacks include Rotation, Scaling and Translation (RST) attack, Linear Geometric Transform, shearing and other affine transforms. The parameters of global attack are not complicated. There are many countermeasures are available for global attacks. M. Barni proposed an exhaustive search for the watermark in the space including a set of acceptable attack parameters [1]. Ruanaidh and Pun proposed Fourier–Mellin transform which is invariant to global RST transformation [2]. Image normalization algorithm achieves its robustness by both embedding and detecting the watermark message in the normalized image [3]. Another countermeasure is a blind watermarking scheme using geometrically invariant image features. The detection of the watermark can be conducted with the help of image features [4]. Local attacks include Random Bending Attack, C-LPCD (Constrained Local Permutation with Cancelation and Duplication) etc. Very few schemes are available against local attacks. In this paper, presents a blind watermarking scheme against local attacks. A new globally and locally feature transform called Local Daisy feature transform. Then, partition this invariant geometric space using Binary Space Partition Tree. The location of every single pixel is in variable to geometrical distortions like rotation, scaling, translation and resistant against cropping. Lastly, Logarithmic quantization index modulation watermarking embedding method is used to embed watermarking sequence bit by bit into leaf nodes of binary space partition tree. 2. SYSTEM ARCHITECTURE The watermark embedding process consists of three main steps: 1) constructing the feature space with Local Daisy Feature Transform; 2) partitioning the LDFT space with the Binary Space Partition tree; and 3) embedding watermark information by Logarithmic Quantization Index Modulation watermark embedding method. The watermark extracting process resembles watermark embedding, which comprises three main steps: 1) constructing the feature space of LDFT; 2) partitioning the LDFT space with the BSP tree; and 3) watermark extraction. The proposed watermarking scheme is a blind watermarking scheme.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 425 Fig -1: System Architecture 3. PHASES There are four phases which are listed below  Proposed LDFT  Partitioning LDFT space using BSP tree  Watermark embedding  Watermark Extraction 3.1 Proposed LDFT Most Of the watermarking schemes are robust against global attacks. A new invariant feature transform called Local daisy Feature Transform is proposed in this section. LDFT is based in daisy descriptor [5]. Daisy descriptor is not RST in variant. But this LDFT is not only globally but also locally invariant. In order to create LDFT there are several steps. Initially we need to compute the characteristic scale map of the image. LoG operator is used to obtain the characteristics scale map of the image. This scale map varies with respect to image scaling. Then compute orientation map in every quantized direction this orientation map is then convolved with Gaussian Kernels of different standard deviation. After this convolution we get convolved orientation maps. Then normalize the convolved orientation maps. Now compute the Euclidean distance between normalized vector and the original vector. Finally assign a consistent orientation to each pixel based on image properties. Orientation assignment is done using Histogram of oriented gradients (HOG) [6]. 3.2 Partitioning LDFT Space using BSP Tree In this section we are partitioning the geometrically invariant LDFT space using BSP tree [7]. BSP tree construction is a process which takes a subspace and partitions it by any hyper plane that intersects the interior of that subspace. It generates two new subspaces that can be further partitioned by recursive processes. Initially we select a partition plane to divide the LDFT space. To improve the security we can randomize the order of the selection of the partition plane using a secret key. In order to achieve a balanced BSP tree, set a threshold value. The threshold value is computed as the average values of all the partition planes of the image. Then partition the space using the plane. If the subset is under the partition plane and the value of the feature vector is less than threshold value, the subset is the left child of tree, else right child of tree. This process continues until the no of leaf nodes is equal to the length of the watermark sequence. 3.3 Watermark Embedding Watermarking Sequence is embedded bit by bit into leaf node from left to right using Logarithmic Quantization Index Modulation (LIQM) [8]. Initially, using a compression function the host signal is transformed into logarithmic domain. The watermark data is embedded using uniform quantization. Then using the inverse function, the quantized signal is transformed into the original domain 3.4 Watermark Extraction Extraction is similar to embedding. Initially create the LDFT space and partition it using BSP tree. Now determine the embedded watermark bit using Euclidean distance decoder. 4. CONCLUSIONS A new watermarking scheme against local attack is proposed. Initially a new feature transform called Local Daisy feature transforms is proposed. LDFT is inspired by daisy descriptor. LDFT is invariant to geometrical attacks. Then LDFT space is partitioned using BSP trees. Watermark bits are embedded using Logarithmic quantization index modulation method. REFERENCES [1]. M. Barni, “Effectiveness of exhaustive search and template matching against watermark desynchronization”, IEEE Signal Process, vol 12 no.2, Feb 2005 [2]. J. Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking”, signal process, vol.66, no.3, May 1998 [3]. P. Dong, J.G Brankov, N.P. Galatsanos, Y.Yang, and F. Davoine, “digital watermarking robust to geometric distortion” IEEE Trans, Image Process,. Vol.11 no.9, Sep 2002 [4]. P. Bas, J. Chassey and B. Macq, “Geometrically invariant watermarking using feature points”, IEEE Trans, Image Process, vol.51, no. , apr 2003. [5]. E. Tola, V. Lepetit and P.Fua,”Daisy: An efficient dense descriptor applied to wide-baseline stereo”, IEEE Trans. Pattern Anal. Mach. Intell, vol 32,no5,may 2010 [6]. N.Dalal and B. Triggs, “Histogramof oriented gradients for human detection” in Proc IEEE Comput. Soc. Conf. Comput. Vis In Pattern Recognition, June 2005 [7]. M.Abrash,”BSP Trees”,Dr.Dobbs sourcebook, vol 20, may 1995 [8]. N.K. Kalantari and S.M Ahadi, “a logarithmic quantization index modulation for perceptually better data hiding”, IEEE Trans. Image Processing, vol 19, june 2010