SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 4, August 2018, pp. 2578~2587
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i4.pp2578-2587  2578
Journal homepage: http://iaescore.com/journals/index.php/IJECE
A Blind Multiple Watermarks based on Human Visual
Characteristics
Ferda Ernawan, Siau-Chuin Liew, Zuriani Mustaffa, Kohbalan Moorthy
Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Malaysia
Article Info ABSTRACT
Article history:
Received Apr 9, 2018
Revised Jun 20, 2018
Accepted Jul 11, 2018
Digital watermarking is an alternative solution to prevent unauthorized
duplication, distribution and breach of ownership right. This paper proposes
a watermarking scheme for multiple watermarks embedding. The embedding
of multiple watermarks use a block-based scheme based on human visual
characteristics. A threshold is used to determine the watermark values by
modifying first column of the orthogonal U matrix obtained from Singular
Value Decomposition (SVD). The tradeoff between normalize cross-
correlation and imperceptibility of watermarked image from quantization
steps was used to achieve an optimal threshold value. The results show that
our proposed multiple watermarks scheme exhibit robustness against signal
processing attacks. The proposed scheme demonstrates that the watermark
recovery from chrominance blue was resistant against different types of
attacks.
Keyword:
Arnold scrambling
Human visual characteristic
Image watermarking
Multiple watermarks
Singular value decomposition
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Ferda Ernawan,
Faculty of Computer Systems & Software Engineering,
Universiti Malaysia Pahang,
Lebuhraya Tun Razak 26300 Gambang Kuantan, Pahang, Malaysia.
Email: ferda@ump.edu.my
1. INTRODUCTION
Nowadays, digital images can easily be duplicated, copied, distributed and modified. Thus,
copyright protection method has a growing demand to ensure the content ownership. Digital watermarking
has greatly facilitated to protect the copyright, security, editing of digital data and replication of digital data
in the last few decades [1]-[3]. In recent year, multiple watermarks concept of single watermark model drew
widespread attention for multimedia security. Multiple watermarking models may contain more than a
watermark in the host image [4]. For example, in the case of movie production, multiple originators: director,
producer and house production are involved, therefore they need multiple ownership watermarks. For digital
image photography, photographing editing and producing digital images also require multiple ownership
copyrights. Medical images need multiple watermarks for ownership watermark and alteration verification
watermark. For collaborative distributions, the product is embedded by multiple watermarks (for different
retailers and distributors).
Many researchers presented the hybrid scheme: Discrete Cosine Transform-Singular Value
Decomposition (DCT-SVD) watermarking scheme [5]-[8] that can improve the robustness and invisibility of
watermarked images. Lai’s scheme [6] revealed the relationship of the orthogonal matrix U in the first
column matrix of SVD. The scheme showed an improvement of imperceptibility and robustness under signal
processing attacks. Therefore, some SVD-based watermarking techniques explored U or V matrices instead
of S as presented in Chang et al. [9], Chung et al. [10], Fan et al. [11], Lai et al. [6]. These techniques avoid
the probability of the false positive problems which may occur when embedding is performed into singular
value (S). Though many watermarking techniques have been widely used for copyright protection, only few
Int J Elec & Comp Eng ISSN: 2088-8708 
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2579
methods [11]-[14] have been formulated for multiple watermarking scheme. Multiple watermarking scheme
provides more security and robustness [16], [17].
This paper describes a hybrid method using DCT-SVD based on human visual characteristics for
multiple watermarks. Referring to [18], red color contributes 65% cones which sensitive to human eyes,
green color provides 33% sensitivity and blue color has produces 2% sensitivity. Embedding multiple
watermarks on green and blue colors successively can achieve transparency watermarked image. While the
watermark can easily be removed when the watermarked image was compressed by JPEG. Luminance and
chrominance blue exihibite less sensitivity to human eyes. Therefore, watermark bits are embedded into
luminance and chrominance blue components. Embedding of multiple watermarks is performed by
examining the relationship of U3,1 and U4,1 coefficients of SVD. To enhance the security of watermarked
images, the two watermarks are scrambled by Arnold chaotic. Finally, the selected blocks are inversed by
SVD and DCT to get the watermarked image. The proposed scheme can achieve an improved robustness and
imperceptibility of watermarked image.
The related works demonstrate that multiple watermarks are a vital role in multimedia security. This
watermarking model can be improved by the hybrid techniques and extra security can be achieved using
scrambled watermarks. A new hybrid block-based image watermarking is proposed based on the HVS
characteristics and the embedding process is carried out based on modifying first column of orthogonal
matrix U of SVD. This scheme attains high robustness against attacks. The highlights and some special
features of the proposed scheme are provided as follows:
a. Our scheme proposes multiple watermarks embedding which considers entropy and edge entropy. This
paper proposes an optimal threshold for multiple watermarking in luminance and chrominance blue. Our
scheme produces minimum distortion in the visual watermarked image.
b. Multiple watermarks embedding are performed by examining the first column of U matrix. Watermark
embedding on U matrix of luminance and chrominance blue can improve the robustness and invisibility
of multiple watermarks.
c. Confidentially of watermark image is an important information, it should be extracted by authorized
users. To improve the security level, multiple watermarks are scrambled before they are embedded into
luminance and chrominance blue which can provide extra security in the watermarked image.
d. By finding optimal thresholds for each image component, the quality of the watermarked image produces
high image quality and the recovered watermark resistants against different types of attack.
2. RESEARCH METHOD
2.1. Arnold scrambling
Watermark images are scrambled by Arnold chaotic map to increase the security of multiple
watermarking. Scrambled watermarks cannot be recovered without a secret key even attackers successfully
extract the watermark from luminance and chrominance blue components of the watermarked image. Arnold
scrambling transformation is defined by [19]:
N
y
x
y
x
mod
21
11
'
'


















(1)
where 





'
'
y
x
represents vector position after shifting, 





y
x
represents original vector position before shifting
and mod denotes the modulus operation after division with N. The parameter N represents the period of
Arnold scrambling. In this experiment, the number of iteration order N is used as a secret key for scrambling
transformation. In order to inverse the watermark image, the inverse Arnold transformation can be defined
by:
N
y
x
y
x
mod
'
'
11
12




















(2)
2.2. Human visual characteristics
Human visual characteristics less sensitive against redundancy of image information. It can be
described through entropy to determine most redundant image information. Entropy was exploited to select
significant embedding region. Entropy are applied to determine embedding locations for multiple watermarks
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2580
image. Embedding certain amount of watermark bits in the luminance and chrominance must be invisible to
human eyes. The entropy was used to measure the spatial correlation of neighbor pixels. Entropy of an N-
state is defined by [20]:
2
1
log ( )
N
i i
i
E p p

  (3)
Image edge is an important information of image characteristics. Edge entropy of an image block is
considered for embedding regions. Edge entropy is given as follows:
1
1
exp i
N
p
edge i
i
E p 

  (4)
where ip denotes the occurrence probability of i-th pixel with 0 1ip  and 1- ip represents the uncertainty
or ignorance of the pixel value. The values obtained from combination between entropy and edge entropy are
sorted in ascending order and the lowest value are choosen as embedding regions.
2.3. DCT
A true-color host image is transformed into YCbCr color space. Each component (luminance and
chrominance blue) is divided into small blocks, then each block is computed by modified entropy. Selected
blocks are transformed by two-dimensional DCT to produce the frequency image signals. The two-
dimensional DCT matrix B of an input image A is computed by [21]:
1 1
0 0
(2 1) (2 1)
cos cos ,
2 2
M N
mnpq p q
m n
m p n q
A
M N
B
 
 
 
 
 
   (5)
for p = 0, 1, 2, …, M1 and q = 0, 1, 2, …, N1 where
1
, 0
2
, 0
p
for p
M
for p
M




 
 

1
, 0
2
, 0
q
for q
N
for q
N




 
 

(6)
The inverse of two-dimensional DCT is calculated using
1 1
0 0
(2 1) (2 1)
cos cos ,
2 2
M N
p q mnpq
m n
m p n q
A B
M N
 
 
 
 
 
   (7)
The DCT coefficients are then transformed by SVD which is described in the next sub-section.
2.4. SVD
The SVD factorizes a real or complex matrix into three matrices which are U, S and V matrix. SVD
of A can be presented as follows [22]:
T
A USV (8)
Where U is orthonormal eigenvectors of AAT
, S is a diagonal matrix containing the square of the
eigenvalues A in descending order and V is orthonormal vectors of AT
A. Embedding is performed in the first
column of the orthogonal matrix U by examining U3,1 and U4,1 using some rules. The rules are used to embed
and extract multiple watermarks in the DCT-SVD domain. The rules are described in the proposed
watermarking embedding and extraction algorithms in the next section.
Int J Elec & Comp Eng ISSN: 2088-8708 
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2581
2.5. Imperceptibility measurement
This section describes the metrics to evaluate the proposed watermarking scheme. In order to
demonstrate the performance of the proposed scheme, the watermarked imperceptibility is evaluated by
structural similarity (SSIM) index. SSIM is computed by:
     ( , ) ( , ) ( , ) ( , )SSIM x y l x y c x y s x y
  
   (9)
where α>0, β>0, γ>0, are parameters which can be adjusted to signify their relative importance.
2.6. Robustness measurement
Robustness of watermark extraction is measured by Normalized Cross-Correlation (NC) and Bit
Error Rate (BER). NC and BER are given as [23]-[25]:
1 1
2 2
1 1 1 1
( , ). ( , )
( , ) ( , )
M N
i j
M N M N
i j i j
W i j W i j
NC
W i j W i j

 

   


 
(10)
1 1
( , ) ( , )
M N
i j
W i j W i j
BER
M N

 




(11)
where  denotes the exclusive OR operation. M and N represent rows and columns size of the watermark
image, ( , )W i j
 is the extracted watermark and the W(i, j) is the original watermark.
3. PROPOSED SCHEME
3.1. Watermark insertion
Watermark insertion process is divided into ten steps. The proposed multiple watermarks scheme is
described in Algorithm 1.
Algorithm 1: Watermark Insertion
Input: Host image; watermark; threshold (T)
Step 1: The cover color image is converted to YCbCr color channels. Embedding multiple watermarks is performed in
Luminance (Y) and Chrominance-Blue (Cb).
Step 2: Luminance and chrominance blue are divided by 8×8 pixels.
Step 3: Calculate entropy values for each block.
Step 4: Select blocks based on entropy values and save the x and y coordinates
Step 5: Both binary watermarks are scrambled by Arnold chaotic.
Step 6: Apply DCT for each selected blocks.
Step 7: Perform SVD based on block-based DCT coefficients for watermark embedding.
Step 8: For each watermark bit, embed watermark according to the rules as follows:
Rule 1: if the number of bits are less than maximum watermark bits, calculate the average U3,1 and U4,1 coefficients
and save it to m.
Rule 2: if the binary watermark equal to 1 and U3,1 coefficient is less than U4,1 coefficient, modify the coefficients by:
U3,1=m+ T/2; U4,1=m - T/2.
Rule 3: if the binary watermark bit equal to 0 and U3,1 coefficient is less than U4,1 coefficient, modify the coefficients
by: U3,1=m - T/2; U4,1=m + T/2.
Step 9: Perform the inverse SVD, then applying the inverse DCT on each selected block.
Step 10: Merging all YCbCr components and convert YCbCr to RGB color image to obtain the watermarked image.
Output: Watermarked image containing a watermark
3.2. Watermark extraction
Step-by-steps to extract multiple watermarks are divided into sevent steps as described in
Algorithm 2.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2582
Algorithm 2: Watermark Extraction
Input: Watermarked image
Step 1: A watermarked color image is converted to YCbCr color channels. Extraction multiple watermarks is performed in
Luminance (Y) and Chrominance-Blue (Cb)
Step 2: Selected block coordinates are used to find the location of embedded multiple watermarks
Step 3: Apply DCT for each selected blocks.
Step 4: Perform SVD on DCT selected block coefficients for extraction purpose in the first column orthogonal U matrix.
Step 5: For each bit of recovered binary watermark is described as follows:
Rule 1: if the number of recovered watermark bits are less than watermark size, calculate the different between U3,1
and U4,1 coefficients
Rule 2: if the different value of U3,1 and U4,1 coefficients is greater than 0, then binary recovered watermark bit =1.
Rule 3: if the different value of U3,1 and U4,1 coefficients is lesser than 0, then binary recovered watermark bit =0.
Step 6: Perform Step 3 to Step 5 for both luminance and chrominance-blue channels until the length of the watermark.
Step 7: Apply inverse Arnold chaotic for both binary watermarks
Output: Watermark recoveries
4. EXPERIMENTAL RESULTS
The proposed multiple watermarking scheme is employed on five true color images with
512×512 pixels as shown in Figure 1. The original true color images are taken from CVG-UGR
database [26].
(a) (b) (c) (d) (e) (f) (g)
Figure 1. Host images: (a) Lena, (b) pepper, (c) car, (d) airplane, (e) sailboat (f) first watermark
(g) second watermark
(a) (b)
Figure 2. An optimal threshold for (a) luminance and (b) chrominance blue
The number of selected blocks for luminance and chrominance blue is 1024, it equal to the
watermark size with 32×32 pixels. Using the experiment, we find a threshold as an optimal trade-off between
transparency and robustness against JPEG compression for the proposed scheme. JPEG compression is the
most popular standard image compression techniques and it has been widely implemented on most digital
cameras [27]-[37]. The experimental results have revealed the optimal thresholds as about 0.016 and 0.24 for
luminance and chrominance, respectively as shown in Figure 2. The multiple watermark insertion and
extraction process are shown in Figure 3 and Figure 4.
0.008 0.01 0.012 0.014 0.016 0.018 0.02 0.022 0.024
0.75
0.8
0.85
0.9
0.95
Threshold against JPEG Compression
Value
Results obtained from JPEG Images
SSIM
NC
0.1 0.15 0.2 0.25 0.3
0.5
0.55
0.6
0.65
0.7
0.75
0.8
0.85
0.9
Threshold against JPEG Compression
Value
Results obtained from JPEG Images
SSIM
NC
Int J Elec & Comp Eng ISSN: 2088-8708 
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2583
Figure 3. Embedding block diagram
Figure 4. Extraction block diagram
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2584
In this experiment, the proposed multiple watermarks prove the robustness against signal processing
attacks especially for embedding in chrominance blue. The embedding in the chrominance blue channel can
provide less distortion and it provides higher robustness than embedding in the luminance component.
Figure 5 shows the recovered multiple watermarks under the different types of attack. Table 1 and Table 2
show the imperceptibility and robustness of watermarked image from Lena image.
(a) (b) (c) (d)
(e) (f) (g) (h)
(i) (j) (k) (l)
Figure 5. Results under different types of attack and the corresponding recovered watermark using
(a) gaussian low pass filter [33], (b) gaussian noise 0.001, (c) sharpening, (d) median filter (3×3), (e) pepper
and salt noise 0.1%, (f) speckle noise 0.01, (g) poisson noise, (h) adjust, (i) histogram equalization attack
(j) cropping rows off 25%, (k) cropping columns off 25%, (l) scaling 0.5
Table 1. NC Values for Lena Image under different Geometrical Attacks
Attack SSIM
Watermark 1 Watermark 2
NC BER NC BER
Cropping rows off 25% 0.6605 0.8100 0.1699 0.8393 0.1475
Cropping rows off 50% 0.4364 0.6427 0.2900 0.6471 0.2900
Cropping columns off 25% 0.6547 0.8824 0.1094 0.8252 0.1592
Cropping columns off 50% 0.4176 0.8293 0.1543 0.7363 0.2285
Rotation 2˚ 0.4905 0.5542 0.4756 0.4635 0.5078
Rotation 45˚ 0.2004 0.5069 0.4922 0.4203 0.5186
Translate attack (10, 10) 0.2773 0.5292 0.5264 0.4650 0.5195
Translate attack (10, 20) 0.2680 0.4063 0.4980 0.4449 0.5146
Scaling 0.5 0.8845 0.9970 0.0029 1 0
Scaling 0.25 0.8857 0.6520 0.3398 0.9980 0.0020
Table 2. NC Values for Lena Image under different Signal Processing Attacks
Attack SSIM
Watermark 1 Watermark 2
NC BER NC BER
Gaussian Low Pass Filter [3 3] 0.8857 0.9780 0.0225 1 0
Gaussian Low Pass Filter [5 5] 0.8881 0.9609 0.0410 1 0
Gaussian Noise 0.001 0.8039 0.9068 0.0918 1 0
Gaussian Noise 0.005 0.6512 0.7248 0.2842 1 0
Sharpening 0.7930 0.9535 0.0449 1 0
Median Filter [3 3] 0.8835 0.9722 0.0283 1 0
Median Filter [5 5] 0.9031 0.7834 0.2813 0.9923 0.0078
Pepper and Salt Noise 0.1% 0.8548 0.9831 0.0166 1 0
Int J Elec & Comp Eng ISSN: 2088-8708 
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2585
Attack SSIM
Watermark 1 Watermark 2
NC BER NC BER
Pepper and Salt Noise 1% 0.7386 0.8438 0.1533 1 0
Speckle Noise 0.01 0.7079 0.7774 0.2197 1 0
Poisson Noise 0.7466 0.8172 0.1846 1 0
Adjust 0.7925 0.9950 0.0049 1 0
Histogram Equalization Attack 0.6726 0.9030 0.0957 1 0
JPEG with Q=40 0.8824 0.5874 0.3857 0.7377 0.2559
JPEG with Q=50 0.8684 0.8203 0.1729 0.8738 0.1270
JPEG with Q=60 0.8653 0.9527 0.0469 0.9195 0.0811
JPEG with Q=70 0.8680 0.9970 0.0029 0.9740 0.0264
Figure 6 shows bit error rate of the proposed scheme against JPEG and JPEG2000 compression with
different types of compression level. It can be noticed that watermark insertion in chrominance blue is more
resistants against JPEG2000 than watermark insertion in luminance.
(a) (b)
Figure 6. BER values of the proposed scheme against JPEG and JPEG2000 compression
5. CONCLUSION
This paper proposes block-based multiple watermarking scheme based on human visual
characteristics. This experiment demonstrated the multiple watermarks insertion into host images by
examining U3,1 and U4,1 of the orthogonal matrix. The proposed scheme provides robustness and resistance
against signal processing attacks. The two scrambled watermarks provides extra security and difficult to be
identified. The distributed watermarks embedding based on human visual characteristics can achieve high
imperceptibility of watermarked image. Furthermore, the embedding scheme for luminance and chrominance
blue pairs effectively provides resistance to altered signal processing attacks like JPEG, image noise, image
filter, sharpening, and geometric attacks like scaling, translation, cropping. The optimal threshold for
multiple watermarks is able to achieve optimal robustness and imperceptibility. The results have proven that
our proposed scheme holds excellent robustness and imperceptibility for multiple watermarks.
ACKNOWLEDGEMENTS
The authors express their thanks to Universiti Malaysia Pahang, Malaysia for providing the financial
support for this research project through UMP Research Grant Scheme (RDU170399).
REFERENCES
[1] F. Ernawan, M. N. Kabir, M. Fadli, Z. Mustaffa, “Block-based Tchebichef image watermarking scheme using
psychovisual threshold,” 2nd International Conference on Science and Technology Computer, pp. 006-010, 2016.
[2] F. Ernawan, “Robust Image Watermarking Based on Psychovisual Threshold,” Journal of ICT Research and
Applications, vol.10, no. 3, pp.228-242, 2016.
[3] N.A. Abu, F. Ernawan, N. Suryana, S. Sahib, “Image Watermarking Using Psychovisual Threshold over the Edge,”
Information and Communication Technology, ICT-EurAsia 2013, LNCS, vol. 7804, pp. 519-527, 2013.
2 4 6 8 10 12 14 16 18
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
Compression Ratio
BER
Results Obtained from JPEG2000 Image
Watermark in Luminance
Watermark in Chrominance Blue
2 4 6 8 10 12 14 16 18
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
Compression Ratio
BER
Results Obtained from JPEG2000 Image
Watermark in Luminance
Watermark in Chrominance Blue
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587
2586
[4] S. Roy and A.K. Pal, “A blind DCT based color watermarking algorithm for embedding multiple watermarks,”
International Journal of Electronics and Communications, vol. 72, pp. 149-161, 2017.
[5] H.-T. Hu and L.-Y. Hsu, “Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against
JPEG and JPEG2000 compression,” Computers and Electrical Engineering, vol. 41, pp. 052-063, 2015.
[6] C.-C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Optics
Communications, vol. 284, no. 4, pp. 938-944, 2011
[7] M. Li and C. Han, “A DCT-SVD domain watermarking for color digital image based on compressed sensing theory
and chaos theory,” Seventh International Symposium on Computational Intelligence and Design (ISCID),
pp. 35-38, 2014.
[8] M. Ali, C.W. Ahn, M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT
domain,” Optik, vol. 125, pp. 428-434, 2014.
[9] C.C.Chang, P. Tsai, C.C. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognition Letter,
vol. 26, no. 10, pp. 1577–1586, 2005.
[10] K.L. Chung, W.N. Yang, Y.H. Huang, S.T. Wu, Y.C. Hsu, “On SVD-based watermarking algorithm,” Applied
Mathematics and Computation, vol. 188, no. 1, pp. 54-57, 2007.
[11] M.Q. Fan, H.X. Wang, S.K. Li, “Restudy on SVD-based watermarking scheme,” Applied Mathematics and
Computation, vol. 203, no. 3 pp.926-930, 2008.
[12] V. Khanduja, S. Chakraverty and O.P. Verma, “Enabling information recovery with ownership using robust
multiple watermarks,” Journal of Information Security and Applications, vol. 29, pp. 80-92, 2016.
[13] V. Khanduja, S. Chakraverty and O.P. Verma, R. Tandon, S. Goel, “A robust multiple watermarking technique for
information recovery,” IEEE International Conference on Advance Computing, pp. 250-255, 2014.
[14] S. Behnia, M. Teshnehlab, P. Ayubi, “Multiple-watermarking scheme based on improved chaotic maps,”
Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2469-2478, 2010.
[15] H.-C. Huang, S.-C. Chu, J.-S. Pan, C.-Y. Huang and B.-Y. Liao, “Tabu search based multi-watermarks embedding
algorithm with multiple description coding,” Information Sciences, vol. 181, no. 16, pp. 3379-3396, 2011.
[16] N. Mohananthini and G. Yamuna, “Comparison of multiple watermarking techniques using genetic algorithms,”
Journal of Electrical Systems and Information Technology, vol. 3, no. 1, pp. 68-80, 2016.
[17] R. Chamlawi, A, Khan and I. Usman, “Authentication and recovery of images using multiple watermarks,”
Computers & Electrical Engineering, vol. 36, no. 3, pp. 578-584, 2010.
[18] R.C. Gonzalez, R.E.Wood, “Digital image processing, 2nd edition,” India: Pearson Education, 2002.
[19] M. Khalili, “DCT-Arnold chaotic based watermarking using JPEG-YCbCr,” Optik - International Journal for Light
and Electron Optics, vol. 126, no. 3, pp. 4367-4371, 2015.
[20] F. Ernawan, M. Ramalingam, A.S. Sadiq, Z. Mustaffa, “An improved imperceptibility and robustness of 4x4 DCT-
SVD image watermarking using modified entropy,” Journal of Telecommunication, Electronic and Computer
Engineering, vol. 9, no. 2-7, pp. 111-116, 2017.
[21] F. Ernawan and S.H. Nugraini, “The optimal quantization matrices for JPEG image compression from psychovisual
threshold,” Journal of Theoretical and Applied Information Technology, vol. 70, no. 3, pp. 566-572, 2014.
[22] S.-L. Jia, “A novel blind color images watermarking based on SVD,” Optik - International Journal for Light and
Electron Optics, vol. 125, no. 12, pp. 2868-2874, 2014.
[23] M. Boussif, N. Aloui, A. Cherif, “New Watermarking/Encryption Method for Medical Images Full Protection in m-
Health,” International Journal of Electrical and Computer Engineering, vol. 7, no. 6, pp. 3385-3394, 2017.
[24] V.A. Kumar, C. Dharmaraj, Ch. S. Rao, “A Hybrid Digital Watermarking Approach Using Wavelets and LSB,”
International Journal of Electrical and Computer Engineering, vol. 7, no. 5, pp. 2483-2495, 2017.
[25] I. Iwut, G. Budiman, L. Novamizanti, “Optimization of Discrete Cosine Transform-Based Image Watermarking by
Genetics Algorithm,” International Journal of Electrical and Computer Science, vol. 4, no. 1, pp. 91-103, 2016.
[26] R. Rodriguez-Sanchez, J. Martinez-Baena, A. Garrido, J.A. Garcia, J. Fdez-Valdivia, M.C. Aranda, “Computer
Vision Group”, University of Granada, 2002, http://decsai.ugr.es/cvg/dbimagenes/c512.php.
[27] F. Ernawan, N. Kabir, K.Z. Zamli, “An efficient image compression technique using tchebichef bit allocation,”
Optik - International Journal for Light and Electron Optics, vol. 148, pp. 106-119, 2017.
[28] F. Ernawan, N.A. Abu, N. Suryana, “An adaptive JPEG image compression using psychovisual model,” Advanced
Science Letters, vol. 20, no. 1, pp. 26-31, 2014.
[29] N.A. Abu, F. Ernawan, “A novel psychovisual threshold on large DCT for image compression,” The Scientific
World Journal, vol. 2015, no. 2015, pp. 001-011, 2015.
[30] N.A. Abu, F. Ernawan, N. Suryana, “A generic psychovisual error threshold for the quantization table generation
on JPEG image compression,” 9th
International Colloquium on Signal Processing and its Applications, pp. 39-43,
2013.
[31] F. Ernawan, M.N. Kabir, J.M. Zain, “Bit allocation strategy based on psychovisual threshold in image
compression,” Multimedia Tools and Applications, pp. 1-24, 2017.
[32] F. Ernawan, Z. Mustaffa, L.B. Aji, “An efficient image compression using bit allocation based on psychovisual
threshold,” Information (Japan), vol. 9(9B), pp. 4177-4182, 2016.
[33] N.A. Abu, F. Ernawan, “Psychovisual threshold on large tchebichef moment for image compression,” Applied
Mathematical Sciences, vol. 8, no. 140, pp. 6951-6961, 2014.
[34] F. Ernawan, N.A. Abu, N. Suryana, “Adaptive Tchebichef Moment Transform Image Compression Using
Psychovisual Model,” Journal of Computer Science, vol. 9, no. 6, pp. 716-725, 2013.
Int J Elec & Comp Eng ISSN: 2088-8708 
A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan)
2587
[35] F. Ernawan, N.A. Abu, N. Suryana, “An Optimal Tchebichef Moment Quantization Using Psychovisual Threshold
for Image Compression,” Advanced Science Letters, vol. 20, no. 1, pp. 70-74, 2014.
[36] F. Ernawan, N.A. Abu and N. Suryana, “TMT Quantization Table Generation Based on Psychovisual Threshold for
Image Compression,” International Conference of Information and Communication Technology (ICoICT 2013), pp.
202-207, 2013.
[37] N.A. Abu, F. Ernawan, S. Sahib, “Psychovisual Model on Discrete Orthonormal Transform,” International
Conference on Mathematical Sciences and Statistics (ICMSS 2013), pp.309-314, 2013.

More Related Content

What's hot

A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
IOSR Journals
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
IDES Editor
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
ijistjournal
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
Alexander Decker
 
H3602056060
H3602056060H3602056060
H3602056060
ijceronline
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
IDES Editor
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
International Journal of Science and Research (IJSR)
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
sravanthi mandala
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
ijceronline
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
ijsrd.com
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
IDES Editor
 
K42016368
K42016368K42016368
K42016368
IJERA Editor
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
International Journal of Technical Research & Application
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
ijma
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
gerogepatton
 

What's hot (18)

A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
A0360105
A0360105A0360105
A0360105
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
 
H3602056060
H3602056060H3602056060
H3602056060
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
1820 1824
1820 18241820 1824
1820 1824
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
1918 1923
1918 19231918 1923
1918 1923
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
K42016368
K42016368K42016368
K42016368
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 

Similar to A Blind Multiple Watermarks based on Human Visual Characteristics

[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
IJET - International Journal of Engineering and Techniques
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
IJECEIAES
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
sophiabelthome
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
sipij
 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and Encryption
IRJET Journal
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
IJECEIAES
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
IOSR Journals
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
cscpconf
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
nooriasukmaningtyas
 
A130104
A130104A130104
A130104irjes
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
IOSR Journals
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
IRJET Journal
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
IJERA Editor
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET Journal
 
G0523444
G0523444G0523444
G0523444
IOSR Journals
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
AM Publications,India
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
eSAT Journals
 

Similar to A Blind Multiple Watermarks based on Human Visual Characteristics (20)

[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
1820 1824
1820 18241820 1824
1820 1824
 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and Encryption
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
 
A130104
A130104A130104
A130104
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
G0523444
G0523444G0523444
G0523444
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 

A Blind Multiple Watermarks based on Human Visual Characteristics

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 4, August 2018, pp. 2578~2587 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i4.pp2578-2587  2578 Journal homepage: http://iaescore.com/journals/index.php/IJECE A Blind Multiple Watermarks based on Human Visual Characteristics Ferda Ernawan, Siau-Chuin Liew, Zuriani Mustaffa, Kohbalan Moorthy Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Malaysia Article Info ABSTRACT Article history: Received Apr 9, 2018 Revised Jun 20, 2018 Accepted Jul 11, 2018 Digital watermarking is an alternative solution to prevent unauthorized duplication, distribution and breach of ownership right. This paper proposes a watermarking scheme for multiple watermarks embedding. The embedding of multiple watermarks use a block-based scheme based on human visual characteristics. A threshold is used to determine the watermark values by modifying first column of the orthogonal U matrix obtained from Singular Value Decomposition (SVD). The tradeoff between normalize cross- correlation and imperceptibility of watermarked image from quantization steps was used to achieve an optimal threshold value. The results show that our proposed multiple watermarks scheme exhibit robustness against signal processing attacks. The proposed scheme demonstrates that the watermark recovery from chrominance blue was resistant against different types of attacks. Keyword: Arnold scrambling Human visual characteristic Image watermarking Multiple watermarks Singular value decomposition Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ferda Ernawan, Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Lebuhraya Tun Razak 26300 Gambang Kuantan, Pahang, Malaysia. Email: ferda@ump.edu.my 1. INTRODUCTION Nowadays, digital images can easily be duplicated, copied, distributed and modified. Thus, copyright protection method has a growing demand to ensure the content ownership. Digital watermarking has greatly facilitated to protect the copyright, security, editing of digital data and replication of digital data in the last few decades [1]-[3]. In recent year, multiple watermarks concept of single watermark model drew widespread attention for multimedia security. Multiple watermarking models may contain more than a watermark in the host image [4]. For example, in the case of movie production, multiple originators: director, producer and house production are involved, therefore they need multiple ownership watermarks. For digital image photography, photographing editing and producing digital images also require multiple ownership copyrights. Medical images need multiple watermarks for ownership watermark and alteration verification watermark. For collaborative distributions, the product is embedded by multiple watermarks (for different retailers and distributors). Many researchers presented the hybrid scheme: Discrete Cosine Transform-Singular Value Decomposition (DCT-SVD) watermarking scheme [5]-[8] that can improve the robustness and invisibility of watermarked images. Lai’s scheme [6] revealed the relationship of the orthogonal matrix U in the first column matrix of SVD. The scheme showed an improvement of imperceptibility and robustness under signal processing attacks. Therefore, some SVD-based watermarking techniques explored U or V matrices instead of S as presented in Chang et al. [9], Chung et al. [10], Fan et al. [11], Lai et al. [6]. These techniques avoid the probability of the false positive problems which may occur when embedding is performed into singular value (S). Though many watermarking techniques have been widely used for copyright protection, only few
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan) 2579 methods [11]-[14] have been formulated for multiple watermarking scheme. Multiple watermarking scheme provides more security and robustness [16], [17]. This paper describes a hybrid method using DCT-SVD based on human visual characteristics for multiple watermarks. Referring to [18], red color contributes 65% cones which sensitive to human eyes, green color provides 33% sensitivity and blue color has produces 2% sensitivity. Embedding multiple watermarks on green and blue colors successively can achieve transparency watermarked image. While the watermark can easily be removed when the watermarked image was compressed by JPEG. Luminance and chrominance blue exihibite less sensitivity to human eyes. Therefore, watermark bits are embedded into luminance and chrominance blue components. Embedding of multiple watermarks is performed by examining the relationship of U3,1 and U4,1 coefficients of SVD. To enhance the security of watermarked images, the two watermarks are scrambled by Arnold chaotic. Finally, the selected blocks are inversed by SVD and DCT to get the watermarked image. The proposed scheme can achieve an improved robustness and imperceptibility of watermarked image. The related works demonstrate that multiple watermarks are a vital role in multimedia security. This watermarking model can be improved by the hybrid techniques and extra security can be achieved using scrambled watermarks. A new hybrid block-based image watermarking is proposed based on the HVS characteristics and the embedding process is carried out based on modifying first column of orthogonal matrix U of SVD. This scheme attains high robustness against attacks. The highlights and some special features of the proposed scheme are provided as follows: a. Our scheme proposes multiple watermarks embedding which considers entropy and edge entropy. This paper proposes an optimal threshold for multiple watermarking in luminance and chrominance blue. Our scheme produces minimum distortion in the visual watermarked image. b. Multiple watermarks embedding are performed by examining the first column of U matrix. Watermark embedding on U matrix of luminance and chrominance blue can improve the robustness and invisibility of multiple watermarks. c. Confidentially of watermark image is an important information, it should be extracted by authorized users. To improve the security level, multiple watermarks are scrambled before they are embedded into luminance and chrominance blue which can provide extra security in the watermarked image. d. By finding optimal thresholds for each image component, the quality of the watermarked image produces high image quality and the recovered watermark resistants against different types of attack. 2. RESEARCH METHOD 2.1. Arnold scrambling Watermark images are scrambled by Arnold chaotic map to increase the security of multiple watermarking. Scrambled watermarks cannot be recovered without a secret key even attackers successfully extract the watermark from luminance and chrominance blue components of the watermarked image. Arnold scrambling transformation is defined by [19]: N y x y x mod 21 11 ' '                   (1) where       ' ' y x represents vector position after shifting,       y x represents original vector position before shifting and mod denotes the modulus operation after division with N. The parameter N represents the period of Arnold scrambling. In this experiment, the number of iteration order N is used as a secret key for scrambling transformation. In order to inverse the watermark image, the inverse Arnold transformation can be defined by: N y x y x mod ' ' 11 12                     (2) 2.2. Human visual characteristics Human visual characteristics less sensitive against redundancy of image information. It can be described through entropy to determine most redundant image information. Entropy was exploited to select significant embedding region. Entropy are applied to determine embedding locations for multiple watermarks
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587 2580 image. Embedding certain amount of watermark bits in the luminance and chrominance must be invisible to human eyes. The entropy was used to measure the spatial correlation of neighbor pixels. Entropy of an N- state is defined by [20]: 2 1 log ( ) N i i i E p p    (3) Image edge is an important information of image characteristics. Edge entropy of an image block is considered for embedding regions. Edge entropy is given as follows: 1 1 exp i N p edge i i E p     (4) where ip denotes the occurrence probability of i-th pixel with 0 1ip  and 1- ip represents the uncertainty or ignorance of the pixel value. The values obtained from combination between entropy and edge entropy are sorted in ascending order and the lowest value are choosen as embedding regions. 2.3. DCT A true-color host image is transformed into YCbCr color space. Each component (luminance and chrominance blue) is divided into small blocks, then each block is computed by modified entropy. Selected blocks are transformed by two-dimensional DCT to produce the frequency image signals. The two- dimensional DCT matrix B of an input image A is computed by [21]: 1 1 0 0 (2 1) (2 1) cos cos , 2 2 M N mnpq p q m n m p n q A M N B              (5) for p = 0, 1, 2, …, M1 and q = 0, 1, 2, …, N1 where 1 , 0 2 , 0 p for p M for p M          1 , 0 2 , 0 q for q N for q N          (6) The inverse of two-dimensional DCT is calculated using 1 1 0 0 (2 1) (2 1) cos cos , 2 2 M N p q mnpq m n m p n q A B M N              (7) The DCT coefficients are then transformed by SVD which is described in the next sub-section. 2.4. SVD The SVD factorizes a real or complex matrix into three matrices which are U, S and V matrix. SVD of A can be presented as follows [22]: T A USV (8) Where U is orthonormal eigenvectors of AAT , S is a diagonal matrix containing the square of the eigenvalues A in descending order and V is orthonormal vectors of AT A. Embedding is performed in the first column of the orthogonal matrix U by examining U3,1 and U4,1 using some rules. The rules are used to embed and extract multiple watermarks in the DCT-SVD domain. The rules are described in the proposed watermarking embedding and extraction algorithms in the next section.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan) 2581 2.5. Imperceptibility measurement This section describes the metrics to evaluate the proposed watermarking scheme. In order to demonstrate the performance of the proposed scheme, the watermarked imperceptibility is evaluated by structural similarity (SSIM) index. SSIM is computed by:      ( , ) ( , ) ( , ) ( , )SSIM x y l x y c x y s x y       (9) where α>0, β>0, γ>0, are parameters which can be adjusted to signify their relative importance. 2.6. Robustness measurement Robustness of watermark extraction is measured by Normalized Cross-Correlation (NC) and Bit Error Rate (BER). NC and BER are given as [23]-[25]: 1 1 2 2 1 1 1 1 ( , ). ( , ) ( , ) ( , ) M N i j M N M N i j i j W i j W i j NC W i j W i j             (10) 1 1 ( , ) ( , ) M N i j W i j W i j BER M N        (11) where  denotes the exclusive OR operation. M and N represent rows and columns size of the watermark image, ( , )W i j  is the extracted watermark and the W(i, j) is the original watermark. 3. PROPOSED SCHEME 3.1. Watermark insertion Watermark insertion process is divided into ten steps. The proposed multiple watermarks scheme is described in Algorithm 1. Algorithm 1: Watermark Insertion Input: Host image; watermark; threshold (T) Step 1: The cover color image is converted to YCbCr color channels. Embedding multiple watermarks is performed in Luminance (Y) and Chrominance-Blue (Cb). Step 2: Luminance and chrominance blue are divided by 8×8 pixels. Step 3: Calculate entropy values for each block. Step 4: Select blocks based on entropy values and save the x and y coordinates Step 5: Both binary watermarks are scrambled by Arnold chaotic. Step 6: Apply DCT for each selected blocks. Step 7: Perform SVD based on block-based DCT coefficients for watermark embedding. Step 8: For each watermark bit, embed watermark according to the rules as follows: Rule 1: if the number of bits are less than maximum watermark bits, calculate the average U3,1 and U4,1 coefficients and save it to m. Rule 2: if the binary watermark equal to 1 and U3,1 coefficient is less than U4,1 coefficient, modify the coefficients by: U3,1=m+ T/2; U4,1=m - T/2. Rule 3: if the binary watermark bit equal to 0 and U3,1 coefficient is less than U4,1 coefficient, modify the coefficients by: U3,1=m - T/2; U4,1=m + T/2. Step 9: Perform the inverse SVD, then applying the inverse DCT on each selected block. Step 10: Merging all YCbCr components and convert YCbCr to RGB color image to obtain the watermarked image. Output: Watermarked image containing a watermark 3.2. Watermark extraction Step-by-steps to extract multiple watermarks are divided into sevent steps as described in Algorithm 2.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587 2582 Algorithm 2: Watermark Extraction Input: Watermarked image Step 1: A watermarked color image is converted to YCbCr color channels. Extraction multiple watermarks is performed in Luminance (Y) and Chrominance-Blue (Cb) Step 2: Selected block coordinates are used to find the location of embedded multiple watermarks Step 3: Apply DCT for each selected blocks. Step 4: Perform SVD on DCT selected block coefficients for extraction purpose in the first column orthogonal U matrix. Step 5: For each bit of recovered binary watermark is described as follows: Rule 1: if the number of recovered watermark bits are less than watermark size, calculate the different between U3,1 and U4,1 coefficients Rule 2: if the different value of U3,1 and U4,1 coefficients is greater than 0, then binary recovered watermark bit =1. Rule 3: if the different value of U3,1 and U4,1 coefficients is lesser than 0, then binary recovered watermark bit =0. Step 6: Perform Step 3 to Step 5 for both luminance and chrominance-blue channels until the length of the watermark. Step 7: Apply inverse Arnold chaotic for both binary watermarks Output: Watermark recoveries 4. EXPERIMENTAL RESULTS The proposed multiple watermarking scheme is employed on five true color images with 512×512 pixels as shown in Figure 1. The original true color images are taken from CVG-UGR database [26]. (a) (b) (c) (d) (e) (f) (g) Figure 1. Host images: (a) Lena, (b) pepper, (c) car, (d) airplane, (e) sailboat (f) first watermark (g) second watermark (a) (b) Figure 2. An optimal threshold for (a) luminance and (b) chrominance blue The number of selected blocks for luminance and chrominance blue is 1024, it equal to the watermark size with 32×32 pixels. Using the experiment, we find a threshold as an optimal trade-off between transparency and robustness against JPEG compression for the proposed scheme. JPEG compression is the most popular standard image compression techniques and it has been widely implemented on most digital cameras [27]-[37]. The experimental results have revealed the optimal thresholds as about 0.016 and 0.24 for luminance and chrominance, respectively as shown in Figure 2. The multiple watermark insertion and extraction process are shown in Figure 3 and Figure 4. 0.008 0.01 0.012 0.014 0.016 0.018 0.02 0.022 0.024 0.75 0.8 0.85 0.9 0.95 Threshold against JPEG Compression Value Results obtained from JPEG Images SSIM NC 0.1 0.15 0.2 0.25 0.3 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 Threshold against JPEG Compression Value Results obtained from JPEG Images SSIM NC
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan) 2583 Figure 3. Embedding block diagram Figure 4. Extraction block diagram
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587 2584 In this experiment, the proposed multiple watermarks prove the robustness against signal processing attacks especially for embedding in chrominance blue. The embedding in the chrominance blue channel can provide less distortion and it provides higher robustness than embedding in the luminance component. Figure 5 shows the recovered multiple watermarks under the different types of attack. Table 1 and Table 2 show the imperceptibility and robustness of watermarked image from Lena image. (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) Figure 5. Results under different types of attack and the corresponding recovered watermark using (a) gaussian low pass filter [33], (b) gaussian noise 0.001, (c) sharpening, (d) median filter (3×3), (e) pepper and salt noise 0.1%, (f) speckle noise 0.01, (g) poisson noise, (h) adjust, (i) histogram equalization attack (j) cropping rows off 25%, (k) cropping columns off 25%, (l) scaling 0.5 Table 1. NC Values for Lena Image under different Geometrical Attacks Attack SSIM Watermark 1 Watermark 2 NC BER NC BER Cropping rows off 25% 0.6605 0.8100 0.1699 0.8393 0.1475 Cropping rows off 50% 0.4364 0.6427 0.2900 0.6471 0.2900 Cropping columns off 25% 0.6547 0.8824 0.1094 0.8252 0.1592 Cropping columns off 50% 0.4176 0.8293 0.1543 0.7363 0.2285 Rotation 2˚ 0.4905 0.5542 0.4756 0.4635 0.5078 Rotation 45˚ 0.2004 0.5069 0.4922 0.4203 0.5186 Translate attack (10, 10) 0.2773 0.5292 0.5264 0.4650 0.5195 Translate attack (10, 20) 0.2680 0.4063 0.4980 0.4449 0.5146 Scaling 0.5 0.8845 0.9970 0.0029 1 0 Scaling 0.25 0.8857 0.6520 0.3398 0.9980 0.0020 Table 2. NC Values for Lena Image under different Signal Processing Attacks Attack SSIM Watermark 1 Watermark 2 NC BER NC BER Gaussian Low Pass Filter [3 3] 0.8857 0.9780 0.0225 1 0 Gaussian Low Pass Filter [5 5] 0.8881 0.9609 0.0410 1 0 Gaussian Noise 0.001 0.8039 0.9068 0.0918 1 0 Gaussian Noise 0.005 0.6512 0.7248 0.2842 1 0 Sharpening 0.7930 0.9535 0.0449 1 0 Median Filter [3 3] 0.8835 0.9722 0.0283 1 0 Median Filter [5 5] 0.9031 0.7834 0.2813 0.9923 0.0078 Pepper and Salt Noise 0.1% 0.8548 0.9831 0.0166 1 0
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan) 2585 Attack SSIM Watermark 1 Watermark 2 NC BER NC BER Pepper and Salt Noise 1% 0.7386 0.8438 0.1533 1 0 Speckle Noise 0.01 0.7079 0.7774 0.2197 1 0 Poisson Noise 0.7466 0.8172 0.1846 1 0 Adjust 0.7925 0.9950 0.0049 1 0 Histogram Equalization Attack 0.6726 0.9030 0.0957 1 0 JPEG with Q=40 0.8824 0.5874 0.3857 0.7377 0.2559 JPEG with Q=50 0.8684 0.8203 0.1729 0.8738 0.1270 JPEG with Q=60 0.8653 0.9527 0.0469 0.9195 0.0811 JPEG with Q=70 0.8680 0.9970 0.0029 0.9740 0.0264 Figure 6 shows bit error rate of the proposed scheme against JPEG and JPEG2000 compression with different types of compression level. It can be noticed that watermark insertion in chrominance blue is more resistants against JPEG2000 than watermark insertion in luminance. (a) (b) Figure 6. BER values of the proposed scheme against JPEG and JPEG2000 compression 5. CONCLUSION This paper proposes block-based multiple watermarking scheme based on human visual characteristics. This experiment demonstrated the multiple watermarks insertion into host images by examining U3,1 and U4,1 of the orthogonal matrix. The proposed scheme provides robustness and resistance against signal processing attacks. The two scrambled watermarks provides extra security and difficult to be identified. The distributed watermarks embedding based on human visual characteristics can achieve high imperceptibility of watermarked image. Furthermore, the embedding scheme for luminance and chrominance blue pairs effectively provides resistance to altered signal processing attacks like JPEG, image noise, image filter, sharpening, and geometric attacks like scaling, translation, cropping. The optimal threshold for multiple watermarks is able to achieve optimal robustness and imperceptibility. The results have proven that our proposed scheme holds excellent robustness and imperceptibility for multiple watermarks. ACKNOWLEDGEMENTS The authors express their thanks to Universiti Malaysia Pahang, Malaysia for providing the financial support for this research project through UMP Research Grant Scheme (RDU170399). REFERENCES [1] F. Ernawan, M. N. Kabir, M. Fadli, Z. Mustaffa, “Block-based Tchebichef image watermarking scheme using psychovisual threshold,” 2nd International Conference on Science and Technology Computer, pp. 006-010, 2016. [2] F. Ernawan, “Robust Image Watermarking Based on Psychovisual Threshold,” Journal of ICT Research and Applications, vol.10, no. 3, pp.228-242, 2016. [3] N.A. Abu, F. Ernawan, N. Suryana, S. Sahib, “Image Watermarking Using Psychovisual Threshold over the Edge,” Information and Communication Technology, ICT-EurAsia 2013, LNCS, vol. 7804, pp. 519-527, 2013. 2 4 6 8 10 12 14 16 18 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2 Compression Ratio BER Results Obtained from JPEG2000 Image Watermark in Luminance Watermark in Chrominance Blue 2 4 6 8 10 12 14 16 18 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2 Compression Ratio BER Results Obtained from JPEG2000 Image Watermark in Luminance Watermark in Chrominance Blue
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2578 – 2587 2586 [4] S. Roy and A.K. Pal, “A blind DCT based color watermarking algorithm for embedding multiple watermarks,” International Journal of Electronics and Communications, vol. 72, pp. 149-161, 2017. [5] H.-T. Hu and L.-Y. Hsu, “Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression,” Computers and Electrical Engineering, vol. 41, pp. 052-063, 2015. [6] C.-C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Optics Communications, vol. 284, no. 4, pp. 938-944, 2011 [7] M. Li and C. Han, “A DCT-SVD domain watermarking for color digital image based on compressed sensing theory and chaos theory,” Seventh International Symposium on Computational Intelligence and Design (ISCID), pp. 35-38, 2014. [8] M. Ali, C.W. Ahn, M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik, vol. 125, pp. 428-434, 2014. [9] C.C.Chang, P. Tsai, C.C. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognition Letter, vol. 26, no. 10, pp. 1577–1586, 2005. [10] K.L. Chung, W.N. Yang, Y.H. Huang, S.T. Wu, Y.C. Hsu, “On SVD-based watermarking algorithm,” Applied Mathematics and Computation, vol. 188, no. 1, pp. 54-57, 2007. [11] M.Q. Fan, H.X. Wang, S.K. Li, “Restudy on SVD-based watermarking scheme,” Applied Mathematics and Computation, vol. 203, no. 3 pp.926-930, 2008. [12] V. Khanduja, S. Chakraverty and O.P. Verma, “Enabling information recovery with ownership using robust multiple watermarks,” Journal of Information Security and Applications, vol. 29, pp. 80-92, 2016. [13] V. Khanduja, S. Chakraverty and O.P. Verma, R. Tandon, S. Goel, “A robust multiple watermarking technique for information recovery,” IEEE International Conference on Advance Computing, pp. 250-255, 2014. [14] S. Behnia, M. Teshnehlab, P. Ayubi, “Multiple-watermarking scheme based on improved chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2469-2478, 2010. [15] H.-C. Huang, S.-C. Chu, J.-S. Pan, C.-Y. Huang and B.-Y. Liao, “Tabu search based multi-watermarks embedding algorithm with multiple description coding,” Information Sciences, vol. 181, no. 16, pp. 3379-3396, 2011. [16] N. Mohananthini and G. Yamuna, “Comparison of multiple watermarking techniques using genetic algorithms,” Journal of Electrical Systems and Information Technology, vol. 3, no. 1, pp. 68-80, 2016. [17] R. Chamlawi, A, Khan and I. Usman, “Authentication and recovery of images using multiple watermarks,” Computers & Electrical Engineering, vol. 36, no. 3, pp. 578-584, 2010. [18] R.C. Gonzalez, R.E.Wood, “Digital image processing, 2nd edition,” India: Pearson Education, 2002. [19] M. Khalili, “DCT-Arnold chaotic based watermarking using JPEG-YCbCr,” Optik - International Journal for Light and Electron Optics, vol. 126, no. 3, pp. 4367-4371, 2015. [20] F. Ernawan, M. Ramalingam, A.S. Sadiq, Z. Mustaffa, “An improved imperceptibility and robustness of 4x4 DCT- SVD image watermarking using modified entropy,” Journal of Telecommunication, Electronic and Computer Engineering, vol. 9, no. 2-7, pp. 111-116, 2017. [21] F. Ernawan and S.H. Nugraini, “The optimal quantization matrices for JPEG image compression from psychovisual threshold,” Journal of Theoretical and Applied Information Technology, vol. 70, no. 3, pp. 566-572, 2014. [22] S.-L. Jia, “A novel blind color images watermarking based on SVD,” Optik - International Journal for Light and Electron Optics, vol. 125, no. 12, pp. 2868-2874, 2014. [23] M. Boussif, N. Aloui, A. Cherif, “New Watermarking/Encryption Method for Medical Images Full Protection in m- Health,” International Journal of Electrical and Computer Engineering, vol. 7, no. 6, pp. 3385-3394, 2017. [24] V.A. Kumar, C. Dharmaraj, Ch. S. Rao, “A Hybrid Digital Watermarking Approach Using Wavelets and LSB,” International Journal of Electrical and Computer Engineering, vol. 7, no. 5, pp. 2483-2495, 2017. [25] I. Iwut, G. Budiman, L. Novamizanti, “Optimization of Discrete Cosine Transform-Based Image Watermarking by Genetics Algorithm,” International Journal of Electrical and Computer Science, vol. 4, no. 1, pp. 91-103, 2016. [26] R. Rodriguez-Sanchez, J. Martinez-Baena, A. Garrido, J.A. Garcia, J. Fdez-Valdivia, M.C. Aranda, “Computer Vision Group”, University of Granada, 2002, http://decsai.ugr.es/cvg/dbimagenes/c512.php. [27] F. Ernawan, N. Kabir, K.Z. Zamli, “An efficient image compression technique using tchebichef bit allocation,” Optik - International Journal for Light and Electron Optics, vol. 148, pp. 106-119, 2017. [28] F. Ernawan, N.A. Abu, N. Suryana, “An adaptive JPEG image compression using psychovisual model,” Advanced Science Letters, vol. 20, no. 1, pp. 26-31, 2014. [29] N.A. Abu, F. Ernawan, “A novel psychovisual threshold on large DCT for image compression,” The Scientific World Journal, vol. 2015, no. 2015, pp. 001-011, 2015. [30] N.A. Abu, F. Ernawan, N. Suryana, “A generic psychovisual error threshold for the quantization table generation on JPEG image compression,” 9th International Colloquium on Signal Processing and its Applications, pp. 39-43, 2013. [31] F. Ernawan, M.N. Kabir, J.M. Zain, “Bit allocation strategy based on psychovisual threshold in image compression,” Multimedia Tools and Applications, pp. 1-24, 2017. [32] F. Ernawan, Z. Mustaffa, L.B. Aji, “An efficient image compression using bit allocation based on psychovisual threshold,” Information (Japan), vol. 9(9B), pp. 4177-4182, 2016. [33] N.A. Abu, F. Ernawan, “Psychovisual threshold on large tchebichef moment for image compression,” Applied Mathematical Sciences, vol. 8, no. 140, pp. 6951-6961, 2014. [34] F. Ernawan, N.A. Abu, N. Suryana, “Adaptive Tchebichef Moment Transform Image Compression Using Psychovisual Model,” Journal of Computer Science, vol. 9, no. 6, pp. 716-725, 2013.
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708  A Blind Multiple Watermarks based on Human Visual Characteristics (Ferda Ernawan) 2587 [35] F. Ernawan, N.A. Abu, N. Suryana, “An Optimal Tchebichef Moment Quantization Using Psychovisual Threshold for Image Compression,” Advanced Science Letters, vol. 20, no. 1, pp. 70-74, 2014. [36] F. Ernawan, N.A. Abu and N. Suryana, “TMT Quantization Table Generation Based on Psychovisual Threshold for Image Compression,” International Conference of Information and Communication Technology (ICoICT 2013), pp. 202-207, 2013. [37] N.A. Abu, F. Ernawan, S. Sahib, “Psychovisual Model on Discrete Orthonormal Transform,” International Conference on Mathematical Sciences and Statistics (ICMSS 2013), pp.309-314, 2013.