SlideShare a Scribd company logo
A DIGITAL COLOR IMAGE
WATERMARKING SYSTEM USING BLIND
SOURCE SEPARATION
Dr.Sangeeta D. Jadhav
Prof. and HOD(IT), Army Institute of Technology,Pune,INDIA
djsangeeta@rediffmail.com

ABSTRACT
An attempt is made to implement a digital color image-adaptive watermarking scheme in
spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial
domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the
presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden–
Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and
textured portions of the image. Texture analysis is carried based on energy content of the
image (using GLCM) which makes the method image adaptive to embed color watermark.
The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI
and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also
checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms
are used in extraction procedure ,through which the watermark can be retrieved efficiently . An
effort is taken to find out the best suited color space to embed the watermark which satisfies the
condition of imperceptibility and robustness against various attacks.

INDEX TERMS — ICA,GLCM,BSS,BFGS

1. INTRODUCTION
One of the more interesting applications is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data
security and intellectual property rights.[1-3]
There are numerous techniques for embedding a digital image watermark like additive spread
spectrum ,multiplicative spread spectrum DC-QIM etc.
The separation of mixed images is a very exciting area of research, especially when no a priori
information is available about the mixed images. In such a case, blind signal separation (BSS)
technique is needed to recover independent sources given only sensor observations, which are
assumed to be unknown linear mixtures of unknown independent images. [4,5]. The watermarked
image is viewed as linear mixture of sources i.e. original image and watermarks. Independent
Component Analysis (ICA) is probably the most powerful and widely used method for
performing BSS [6-9].

Natarajan Meghanathan et al. (Eds) : ITCSE, ICDIP, ICAIT - 2013
pp. 109–116, 2013. © CS & IT-CSCP 2013

DOI : 10.5121/csit.2013.3911
110

Computer Science & Information Technology (CS & IT)

2. SYSTEM DESCRIPTION
The basic principle of digital image watermarking technique is based on BSS model to embed the
watermark in the host image. Watermark embedding is carried out in spatial domain and hybrid
domain. These embedding techniques are explained in following sections w. r. t. blue channel of
RGB space covertext image.

2.1. Embedding in Hybrid Domain
Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with
M>>N. Select their blue channels.
Step-2 Select textured region block based on energy of the sub-image . Take one level DWT
and use LL1 for further processing in single level of DWT . Similarly LL2 and LL3 a in case of
two level DWT and three level DWT. Spatial domain watermark is used for embedding.
Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep
spatial domain watermark hidden in textured sub-image to form the watermarked mixtures. The
inverse wavelet transform of watermarked mixtures is taken.
Step-4
One of the compound sub-images (watermarked sub-image) is encrusted into the
corresponding blocks of the earlier chosen region of high energy in the original image. The other
secret watermarked mixture in blue channels must be kept for a prospective use in the watermark
extraction process.
Above steps are explained with Figure 1 trough Figure 5 during embedding process.

(a)

(b)

Figure 1: Original Image (a) Watermark (b).

Figure 2: Smooth and Textured Portions of Original Image
Computer Science & Information Technology (CS & IT)

111

Figure 3: DWT of Textured Sub-image in Level1

Figure 4: Watermarked Mixture Sub-images after IDWT

(a)

(b)

Figure 5: Original Host Image (a) Watermarked Image (b)

2.2. Extraction Procedure
Step-1 Extract the marked block from the tampered watermarked image by using the first part
of the key which is the position key.
Step- 2 Obtain the blue channels of the extracted blocks.
Step -3 The key watermarked mixture and extracted watermarked mixture are used as the inputs
for BSS/ICA algorithms .
Step-4 BSS/ICA algorithms namely Eigen Value Decomposition ,SOBI and JADE are used to
recover both host sub-image and watermark.
112

Computer Science & Information Technology (CS & IT)

3. METHODOLOGY AND ANALYSIS
3.1. BSS Model
Suppose that there exist N mutually independent source signals S1, S2, ……….. SN and M
observed mixtures X1, X2, ……….. Xm of the source signals (usually M ≥ N). Assuming that
these mixtures are linear, instantaneous and noiseless, the model of BSS can be represented as
X = A.s

(1)

were S = [S1, S2, ……….. SN ]T and X = [X1, X2, ……….. Xm ]T represents source signals
vector and observed vector respectively, and A is M X N scalar mixing matrix of full rank which
is composed of the mixing coefficients.
We use (1) as the mixture model, and a random 2 X 2
Matrix A=

 a1
a
 2

b1 
b2 


Where ‘ A’ should be a full rank matrix, and the elements of it, which corresponds to the
embedding watermark, should be smaller than other elements relating to the host signal to achieve
the robustness and inperceptibility.

X= A. s

=

 a1 s1 + b1 w 
a s + b w
 2 2 2 

=

 sw1 
 sw 
 2

Where sw1 and sw2 are two observed signals with length L. sw1 is as the watermarked signal,
and sw2 is kept as the secret key k2.

3.2. Algorithm for Generating Mixing Matrix
Likelihood function (Likelihood Vs Iterations) is used for the estimation of Mixing Matrix
generation which is shown below in Figure 6.

Figure 6: Likelihood surface
Computer Science & Information Technology (CS & IT)

113

i) Number of iterations are selected in terms of sample points. In proposed method 1000 sample
points are considered.
ii) At each time sample the energy difference (gradient) is calculated between latent mixture
model and original image. Two energy gradient vectors are formed corresponding to two mixtures
.
iii) Mixing Matrix is

1 t (i, j ) 
1 −t (i, j ) 



Where i and j are the sample points on likelihood surface at which the gradient is minimum.
iv) Thus the time varying mixing matrix is used to form watermarked mixtures adaptively.

3.3. Performance Parameters
A series of attacks are tested to verify the robustness of three algorithms include Gaussian low
pass fiter,median filter, adding salt and pepper noise ,adding Gaussian noise ,JPEG compression
etc. The performance analysis parameter viz. Mean Square Error (MSE), PSNR (Peak signal to
Noise Ratio) and NC (Normalized Cross-Correlation) are used to estimate the quality of extracted
watermark.
The equations used are given in Part-I are repeated below1
2
MSE =
∑ [W − W ']
MN m ,n

(2)

PSNR = 10 log10  255 

(3)

NC =

(4)

2

 MSE 


W *W '
∑∑
m=1 n =1

∑∑W × ∑∑W
2

m =1 n =1

'2

m =1 n =1

Where W is original watermark image and W’ is recovered watermark image.
Above parameters are also used to find the retrieval performance with attack compared to the
performance without attack for watermark image. In that case W is treated as recovered
watermark without attack.

4. RESULTS
The Digital Watermarking Method tested for various color spaces viz RGB,YIQ ,YCbCr and HSI
in hybrid domain (DWT for Host and Spatial for Watermark) is compared for mentioned color
spaces.
Figure 7 and Figure 8 shows the sample RGB results for correlation coefficient and PSNR
respectively.
114

Computer Science & Information Technology (CS & IT)

Figure 7: RGB color space correlation coefficient
comparison

Figure 8: RGB color space correlation coefficient
comparison

It is observed that during the recovery of watermark in hybrid domain using three algorithms
for BSS/ICA ,viz. EVD,SOBI JADE , the watermark is recovered in 4 color channels all the
time .These color channels are Blue in RGB,Y inYIQ,Y in YCbCr and S from HIS. Figure 9 and
10 shows the comparison for above mentioned color spaces in hybrid domain for correlation
coefficient (NC) and PSNR for recovered watermark respectively.
Figure 11 describes NC Comparison for Extracted Watermark in
hybrid domain.

Y Channel for spatial and

Figure 9: Hybrid Model PSNR Comparison for 4 color Spaces
Computer Science & Information Technology (CS & IT)

115

Figure 10 : Hybrid Model NC Comparison for 4 color Spaces

Figure 11:NC Comparison for Extracted Watermark in

Y Channel

5. CONCLUSIONS
An image adaptive watermarking system is presented which satisfies imperceptibility and
robustness conditions of watermarking. The novelty of the presented scheme lies in determining
the mixing matrix for BSS model using BFGS optimization technique. This method is based on
the smooth and textured portions of the image. Texture analysis is carried based on energy
content of the image (using GLCM) which makes the method image adaptive to embed color
watermark. The performance evaluation is carried for spatial domain and hybrid domain of
various color spaces like YIQ, HSI and YCbCr. The feasibility of optimization algorithm for
finding mixing matrix is also checked for these color spaces. Y-Channel of YIQ space has
produced motivating results in hybrid domain.

REFERENCES
[1]
[2]

[3]
[4]
[5]
[6]

[7]

A.Cichoki, Shun-ichi Amari,“Adaptive Blind Signal and Image Processing –Learning Algorithms and
Applications”, ISBN: 978-0-471-60791-5,Yr 2002,
pp. 1-175.
Sun Jonahing, Li Jun sheng and Li Zhiyong, “An Improved Algorithm of Digital Watermarking
Based on Wavelet Transform”, IEEE proceedings of 2009 world congress science and information
Engg. , Yr. 2009, pp.280-284.
Moilim Amir, Abdellah Adib and Driss Aboutajdine, “Color Images Watermarking by Means of
Independent Component Analysis”, in IEEE transaction , Yr 2007, pp. 347-350.
Chip-Hong Chang et al., “Fuzzy –Art Based Adaptive digital Watermarking Scheme”, IEEE
transactions on circuits and Systems for Video Technology, Vol-15, No-1, Jan-2005, pp. 65-81.
David Knezevic, “Blind Source Separation for Signal Processing Applications” Thesis Yr.
2004.Google:-citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.3898&rep=rep1&type=pdf
Toshiyuki Tanaka,Yasuyuki Tagami, “ Automatic MIDI Data Making from Music Wave Data
Performed by 2Instruments Using Blind Signal Separation” , Proceedings in SICE-02, Yr-2002, pp.
451-456.
A. Mansour,N.Benchekroun and C Gervaise,“ Blind Separation of Underwater Acoustic Signals”, in
ICA’06,Yr2006,pp.181-188.
116
[8]
[9]

Computer Science & Information Technology (CS & IT)
Bisiaux A., Lemur D., Bertel L., “Source Separation With Collocated Antennas:Application to Digital
Communications in HF”, IEE Conference Publication No-480,Vol. 1,Yr 2001, pp. 311-314.
Minfen Shen,Xinjung Zhang,Lisha Sun,P.J. Beadle,FHY Chan, “A Method For digital Image
Watermarking Using ICA” 4th International symposium on ICA and BSS (ICA 2003), Yr 2003, pp.
209-214.

AUTHOR
Dr. Sangeeta Jadhav has received B.E.(Electronics) in 1992 from University of Pune ,
ME ( Electronics and Telecommunication) in 1999 from Govt.College of Engg. ,
Pune and PhD in Electronics in Yr 2012 from BAMU,Aurangabad. She is currently
Professor at Army Institute of Technology Engg college affiliated to University of
Pune,India. She is fellow member of IETE and life member of Indian Society for
Technical Education (ISTE). She has 12 publications to her credit published at various
international ,national conferences and journals. Her research interests are Image
processing, Blind source separation and Independent Component Analysis.

More Related Content

What's hot

SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
ijcseit
 
I3602061067
I3602061067I3602061067
I3602061067
ijceronline
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
Rappy Saha
 
Estimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using MatlabEstimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using Matlab
IRJET Journal
 
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
CSCJournals
 
spkumar-503report-approved
spkumar-503report-approvedspkumar-503report-approved
spkumar-503report-approved
Prasanna Kumar
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
IRJET Journal
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
eSAT Publishing House
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
csandit
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET Journal
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
ijcnac
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
cscpconf
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
eSAT Publishing House
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
Haitham Ahmed
 
regions
regionsregions
regions
mjbahmani
 

What's hot (15)

SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
I3602061067
I3602061067I3602061067
I3602061067
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
 
Estimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using MatlabEstimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using Matlab
 
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
 
spkumar-503report-approved
spkumar-503report-approvedspkumar-503report-approved
spkumar-503report-approved
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature Descriptor
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
 
regions
regionsregions
regions
 

Viewers also liked

Iranian lawyers office
Iranian lawyers officeIranian lawyers office
Iranian lawyers office
Mahdi Arjomandi
 
Gripe
GripeGripe
178 820 gabarito_preliminar_g4
178 820 gabarito_preliminar_g4178 820 gabarito_preliminar_g4
178 820 gabarito_preliminar_g4
Deusrieta M1)
 
Clackamas county so uses FOCUS 3D Scanner
Clackamas county so uses FOCUS 3D ScannerClackamas county so uses FOCUS 3D Scanner
Clackamas county so uses FOCUS 3D Scanner
Kelly Watt
 
Portfolio_Ellen2014
Portfolio_Ellen2014Portfolio_Ellen2014
Portfolio_Ellen2014
Ellen(Jiaying) Yu
 
Exemples d'affiches présentées lors des séances de communications affichées d...
Exemples d'affiches présentées lors des séances de communications affichées d...Exemples d'affiches présentées lors des séances de communications affichées d...
Exemples d'affiches présentées lors des séances de communications affichées d...
Catherine Rhéaume
 
Brief CV in Arabic & English-OK-U
Brief CV in Arabic & English-OK-UBrief CV in Arabic & English-OK-U
Brief CV in Arabic & English-OK-UDr.omar AL-Jayyar
 
scientific presentation
scientific presentationscientific presentation
scientific presentation
Sarah Simon
 
Hippies
HippiesHippies
Hippies
EllieBeazley
 
Cf bclic
Cf bclicCf bclic
Cf bclic
Pacolg85
 
GO HIGH ON COMMERCE WITH IPHONE APPS
GO HIGH ON COMMERCE WITH IPHONE APPSGO HIGH ON COMMERCE WITH IPHONE APPS
GO HIGH ON COMMERCE WITH IPHONE APPS
Afycon Technologies
 
Purchasing associate performance appraisal
Purchasing associate performance appraisalPurchasing associate performance appraisal
Purchasing associate performance appraisal
calebmoore856
 
Front Desk Checkin Checkout
Front Desk Checkin CheckoutFront Desk Checkin Checkout
Front Desk Checkin Checkout
Melchzedek Clarence Peter
 
eCheck-in Course – General
eCheck-in Course – GeneraleCheck-in Course – General
eCheck-in Course – General
Melchzedek Clarence Peter
 
Front Entrance Arrivals Departures
Front Entrance Arrivals DeparturesFront Entrance Arrivals Departures
Front Entrance Arrivals Departures
Melchzedek Clarence Peter
 
CRM (Customer Really Matters)
CRM (Customer Really Matters)CRM (Customer Really Matters)
CRM (Customer Really Matters)
Melchzedek Clarence Peter
 

Viewers also liked (17)

Iranian lawyers office
Iranian lawyers officeIranian lawyers office
Iranian lawyers office
 
Gripe
GripeGripe
Gripe
 
178 820 gabarito_preliminar_g4
178 820 gabarito_preliminar_g4178 820 gabarito_preliminar_g4
178 820 gabarito_preliminar_g4
 
Clackamas county so uses FOCUS 3D Scanner
Clackamas county so uses FOCUS 3D ScannerClackamas county so uses FOCUS 3D Scanner
Clackamas county so uses FOCUS 3D Scanner
 
Portfolio_Ellen2014
Portfolio_Ellen2014Portfolio_Ellen2014
Portfolio_Ellen2014
 
Exemples d'affiches présentées lors des séances de communications affichées d...
Exemples d'affiches présentées lors des séances de communications affichées d...Exemples d'affiches présentées lors des séances de communications affichées d...
Exemples d'affiches présentées lors des séances de communications affichées d...
 
Brief CV in Arabic & English-OK-U
Brief CV in Arabic & English-OK-UBrief CV in Arabic & English-OK-U
Brief CV in Arabic & English-OK-U
 
scientific presentation
scientific presentationscientific presentation
scientific presentation
 
Pragmadom
PragmadomPragmadom
Pragmadom
 
Hippies
HippiesHippies
Hippies
 
Cf bclic
Cf bclicCf bclic
Cf bclic
 
GO HIGH ON COMMERCE WITH IPHONE APPS
GO HIGH ON COMMERCE WITH IPHONE APPSGO HIGH ON COMMERCE WITH IPHONE APPS
GO HIGH ON COMMERCE WITH IPHONE APPS
 
Purchasing associate performance appraisal
Purchasing associate performance appraisalPurchasing associate performance appraisal
Purchasing associate performance appraisal
 
Front Desk Checkin Checkout
Front Desk Checkin CheckoutFront Desk Checkin Checkout
Front Desk Checkin Checkout
 
eCheck-in Course – General
eCheck-in Course – GeneraleCheck-in Course – General
eCheck-in Course – General
 
Front Entrance Arrivals Departures
Front Entrance Arrivals DeparturesFront Entrance Arrivals Departures
Front Entrance Arrivals Departures
 
CRM (Customer Really Matters)
CRM (Customer Really Matters)CRM (Customer Really Matters)
CRM (Customer Really Matters)
 

Similar to A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
cscpconf
 
H3602056060
H3602056060H3602056060
H3602056060
ijceronline
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
csandit
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
IJERA Editor
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
sipij
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
CSCJournals
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
sipij
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
cscpconf
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
eSAT Journals
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
VLSICS Design
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
VLSICS Design
 
crowd counting.pptx
crowd counting.pptxcrowd counting.pptx
crowd counting.pptx
shubhampawar445982
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
ijfcstjournal
 
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGAIRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET Journal
 
RC2-filterDesign_s
RC2-filterDesign_sRC2-filterDesign_s
RC2-filterDesign_s
henry kang
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
sipij
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
 
I010135760
I010135760I010135760
I010135760
IOSR Journals
 

Similar to A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION (20)

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
H3602056060
H3602056060H3602056060
H3602056060
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
crowd counting.pptx
crowd counting.pptxcrowd counting.pptx
crowd counting.pptx
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGAIRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
 
RC2-filterDesign_s
RC2-filterDesign_sRC2-filterDesign_s
RC2-filterDesign_s
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
I010135760
I010135760I010135760
I010135760
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION

  • 1. A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION Dr.Sangeeta D. Jadhav Prof. and HOD(IT), Army Institute of Technology,Pune,INDIA djsangeeta@rediffmail.com ABSTRACT An attempt is made to implement a digital color image-adaptive watermarking scheme in spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden– Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms are used in extraction procedure ,through which the watermark can be retrieved efficiently . An effort is taken to find out the best suited color space to embed the watermark which satisfies the condition of imperceptibility and robustness against various attacks. INDEX TERMS — ICA,GLCM,BSS,BFGS 1. INTRODUCTION One of the more interesting applications is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights.[1-3] There are numerous techniques for embedding a digital image watermark like additive spread spectrum ,multiplicative spread spectrum DC-QIM etc. The separation of mixed images is a very exciting area of research, especially when no a priori information is available about the mixed images. In such a case, blind signal separation (BSS) technique is needed to recover independent sources given only sensor observations, which are assumed to be unknown linear mixtures of unknown independent images. [4,5]. The watermarked image is viewed as linear mixture of sources i.e. original image and watermarks. Independent Component Analysis (ICA) is probably the most powerful and widely used method for performing BSS [6-9]. Natarajan Meghanathan et al. (Eds) : ITCSE, ICDIP, ICAIT - 2013 pp. 109–116, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3911
  • 2. 110 Computer Science & Information Technology (CS & IT) 2. SYSTEM DESCRIPTION The basic principle of digital image watermarking technique is based on BSS model to embed the watermark in the host image. Watermark embedding is carried out in spatial domain and hybrid domain. These embedding techniques are explained in following sections w. r. t. blue channel of RGB space covertext image. 2.1. Embedding in Hybrid Domain Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with M>>N. Select their blue channels. Step-2 Select textured region block based on energy of the sub-image . Take one level DWT and use LL1 for further processing in single level of DWT . Similarly LL2 and LL3 a in case of two level DWT and three level DWT. Spatial domain watermark is used for embedding. Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep spatial domain watermark hidden in textured sub-image to form the watermarked mixtures. The inverse wavelet transform of watermarked mixtures is taken. Step-4 One of the compound sub-images (watermarked sub-image) is encrusted into the corresponding blocks of the earlier chosen region of high energy in the original image. The other secret watermarked mixture in blue channels must be kept for a prospective use in the watermark extraction process. Above steps are explained with Figure 1 trough Figure 5 during embedding process. (a) (b) Figure 1: Original Image (a) Watermark (b). Figure 2: Smooth and Textured Portions of Original Image
  • 3. Computer Science & Information Technology (CS & IT) 111 Figure 3: DWT of Textured Sub-image in Level1 Figure 4: Watermarked Mixture Sub-images after IDWT (a) (b) Figure 5: Original Host Image (a) Watermarked Image (b) 2.2. Extraction Procedure Step-1 Extract the marked block from the tampered watermarked image by using the first part of the key which is the position key. Step- 2 Obtain the blue channels of the extracted blocks. Step -3 The key watermarked mixture and extracted watermarked mixture are used as the inputs for BSS/ICA algorithms . Step-4 BSS/ICA algorithms namely Eigen Value Decomposition ,SOBI and JADE are used to recover both host sub-image and watermark.
  • 4. 112 Computer Science & Information Technology (CS & IT) 3. METHODOLOGY AND ANALYSIS 3.1. BSS Model Suppose that there exist N mutually independent source signals S1, S2, ……….. SN and M observed mixtures X1, X2, ……….. Xm of the source signals (usually M ≥ N). Assuming that these mixtures are linear, instantaneous and noiseless, the model of BSS can be represented as X = A.s (1) were S = [S1, S2, ……….. SN ]T and X = [X1, X2, ……….. Xm ]T represents source signals vector and observed vector respectively, and A is M X N scalar mixing matrix of full rank which is composed of the mixing coefficients. We use (1) as the mixture model, and a random 2 X 2 Matrix A=  a1 a  2 b1  b2   Where ‘ A’ should be a full rank matrix, and the elements of it, which corresponds to the embedding watermark, should be smaller than other elements relating to the host signal to achieve the robustness and inperceptibility. X= A. s =  a1 s1 + b1 w  a s + b w  2 2 2  =  sw1   sw   2 Where sw1 and sw2 are two observed signals with length L. sw1 is as the watermarked signal, and sw2 is kept as the secret key k2. 3.2. Algorithm for Generating Mixing Matrix Likelihood function (Likelihood Vs Iterations) is used for the estimation of Mixing Matrix generation which is shown below in Figure 6. Figure 6: Likelihood surface
  • 5. Computer Science & Information Technology (CS & IT) 113 i) Number of iterations are selected in terms of sample points. In proposed method 1000 sample points are considered. ii) At each time sample the energy difference (gradient) is calculated between latent mixture model and original image. Two energy gradient vectors are formed corresponding to two mixtures . iii) Mixing Matrix is 1 t (i, j )  1 −t (i, j )    Where i and j are the sample points on likelihood surface at which the gradient is minimum. iv) Thus the time varying mixing matrix is used to form watermarked mixtures adaptively. 3.3. Performance Parameters A series of attacks are tested to verify the robustness of three algorithms include Gaussian low pass fiter,median filter, adding salt and pepper noise ,adding Gaussian noise ,JPEG compression etc. The performance analysis parameter viz. Mean Square Error (MSE), PSNR (Peak signal to Noise Ratio) and NC (Normalized Cross-Correlation) are used to estimate the quality of extracted watermark. The equations used are given in Part-I are repeated below1 2 MSE = ∑ [W − W '] MN m ,n (2) PSNR = 10 log10  255  (3) NC = (4) 2  MSE    W *W ' ∑∑ m=1 n =1 ∑∑W × ∑∑W 2 m =1 n =1 '2 m =1 n =1 Where W is original watermark image and W’ is recovered watermark image. Above parameters are also used to find the retrieval performance with attack compared to the performance without attack for watermark image. In that case W is treated as recovered watermark without attack. 4. RESULTS The Digital Watermarking Method tested for various color spaces viz RGB,YIQ ,YCbCr and HSI in hybrid domain (DWT for Host and Spatial for Watermark) is compared for mentioned color spaces. Figure 7 and Figure 8 shows the sample RGB results for correlation coefficient and PSNR respectively.
  • 6. 114 Computer Science & Information Technology (CS & IT) Figure 7: RGB color space correlation coefficient comparison Figure 8: RGB color space correlation coefficient comparison It is observed that during the recovery of watermark in hybrid domain using three algorithms for BSS/ICA ,viz. EVD,SOBI JADE , the watermark is recovered in 4 color channels all the time .These color channels are Blue in RGB,Y inYIQ,Y in YCbCr and S from HIS. Figure 9 and 10 shows the comparison for above mentioned color spaces in hybrid domain for correlation coefficient (NC) and PSNR for recovered watermark respectively. Figure 11 describes NC Comparison for Extracted Watermark in hybrid domain. Y Channel for spatial and Figure 9: Hybrid Model PSNR Comparison for 4 color Spaces
  • 7. Computer Science & Information Technology (CS & IT) 115 Figure 10 : Hybrid Model NC Comparison for 4 color Spaces Figure 11:NC Comparison for Extracted Watermark in Y Channel 5. CONCLUSIONS An image adaptive watermarking system is presented which satisfies imperceptibility and robustness conditions of watermarking. The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for spatial domain and hybrid domain of various color spaces like YIQ, HSI and YCbCr. The feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Y-Channel of YIQ space has produced motivating results in hybrid domain. REFERENCES [1] [2] [3] [4] [5] [6] [7] A.Cichoki, Shun-ichi Amari,“Adaptive Blind Signal and Image Processing –Learning Algorithms and Applications”, ISBN: 978-0-471-60791-5,Yr 2002, pp. 1-175. Sun Jonahing, Li Jun sheng and Li Zhiyong, “An Improved Algorithm of Digital Watermarking Based on Wavelet Transform”, IEEE proceedings of 2009 world congress science and information Engg. , Yr. 2009, pp.280-284. Moilim Amir, Abdellah Adib and Driss Aboutajdine, “Color Images Watermarking by Means of Independent Component Analysis”, in IEEE transaction , Yr 2007, pp. 347-350. Chip-Hong Chang et al., “Fuzzy –Art Based Adaptive digital Watermarking Scheme”, IEEE transactions on circuits and Systems for Video Technology, Vol-15, No-1, Jan-2005, pp. 65-81. David Knezevic, “Blind Source Separation for Signal Processing Applications” Thesis Yr. 2004.Google:-citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.3898&rep=rep1&type=pdf Toshiyuki Tanaka,Yasuyuki Tagami, “ Automatic MIDI Data Making from Music Wave Data Performed by 2Instruments Using Blind Signal Separation” , Proceedings in SICE-02, Yr-2002, pp. 451-456. A. Mansour,N.Benchekroun and C Gervaise,“ Blind Separation of Underwater Acoustic Signals”, in ICA’06,Yr2006,pp.181-188.
  • 8. 116 [8] [9] Computer Science & Information Technology (CS & IT) Bisiaux A., Lemur D., Bertel L., “Source Separation With Collocated Antennas:Application to Digital Communications in HF”, IEE Conference Publication No-480,Vol. 1,Yr 2001, pp. 311-314. Minfen Shen,Xinjung Zhang,Lisha Sun,P.J. Beadle,FHY Chan, “A Method For digital Image Watermarking Using ICA” 4th International symposium on ICA and BSS (ICA 2003), Yr 2003, pp. 209-214. AUTHOR Dr. Sangeeta Jadhav has received B.E.(Electronics) in 1992 from University of Pune , ME ( Electronics and Telecommunication) in 1999 from Govt.College of Engg. , Pune and PhD in Electronics in Yr 2012 from BAMU,Aurangabad. She is currently Professor at Army Institute of Technology Engg college affiliated to University of Pune,India. She is fellow member of IETE and life member of Indian Society for Technical Education (ISTE). She has 12 publications to her credit published at various international ,national conferences and journals. Her research interests are Image processing, Blind source separation and Independent Component Analysis.