SlideShare a Scribd company logo
1 of 9
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. I (Jan. - Feb .2016), PP 06-14
www.iosrjournals.org
DOI: 10.9790/2834-11110614 www.iosrjournals.org 6 | Page
A Hybrid Model of Watermarking Scheme for Color Image
Authentication Using Discrete Wavelet Transform and Singular
Value Decomposition
Sukanta Kumar Tulo, Dr. Nalinikanta Barpanda, Subhrajit Pradhan,
A. Amiya Kumar Gupta
Department of Electronics Engineering, GIET, GUNUPUR, INDIA
Abstract: Digital Watermarking is a process of embedding information in the multimedia content (host or
cover image) for image authentication. An ideal watermarking system would embed an amount of information
that could not be removed or altered without making the cover object entirely unusable. Over the past few years
digital watermarking has become popular due to its significance in content authentication and legal ownership
for digital multimedia data. A digital watermark is a sequence of information containing the owner’s copyright.
It is inserted invisibly in another image so that it can be extracted at later times for the evidence of rightful
ownership. Available digital watermarking techniques can be categorized into one of the two domains, viz.,
spatial and transform, according to the embedding domain of the host image. Based on these domains digital
watermarking can be done by FFT, DCT, DWT, SVD. The analysis proves that the proposed DWT-SVD hybrid
model is much more superior to other models as it is found to be more robust and effective. The results revealed
that the hybrid model is able to withstand a variety of attacks and shows high level of security.
Keywords: Digital Watermarking, Discrete Wavelet Transform, Hybrid model, Singular Value Decomposition,
Peak Signal to Noise Ratio (PSNR).
I. Introduction
The growth of digital media and the fact that unlimited numbers of perfect copies of such media can be
illegally produced is a threat to the rights of content owners. A copy of digital media is an exact duplicate of the
original. The authors of a work are hesitant to make such information available on the Internet as it may be
copied and retransmitted without the permission of the author. An issue facing electronic commerce on the
Internet for digital information is how to protect the copyright and intellectual property rights of those who
legally own or posses’ digital works. Copyright protection involves ownership authentication and can be used to
identify illegal copies. One approach to copyrighting is to mark works by adding information about their
relationship to the owner by a digital watermark. Digital watermarking is the process of embedding information
into a digital signal which may be used to verify its authenticity or the identity of its owners, in the same manner
as paper bearing a watermark for visible identification. In digital watermarking, the signal may be audio,
pictures, or video. This information may be perceptible or imperceptible to the human senses. Early
watermarking work investigated how documents can be marked so they can be traced in the photocopy process.
If the signal is copied, then the information also is carried in the copy. A signal may carry several different
watermarks at the same time. In visible digital watermarking, the information is visible in the picture or video.
Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has
a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a
visible watermark. In invisible digital watermarking, information is added as digital data to audio, picture, or
video, but it cannot be perceived as such (although it may be possible to detect that some amount of information
is hidden in the signal). The watermark may be intended for widespread use and thus, is made easy to retrieve
or, it may be a form of Steganography, where a party communicates a secret message embedded in the digital
signal. Digital watermarks are employed in an attempt to provide proof of ownership and identify illicit copying
and distribution of multimedia information. This contributes an overview of information hiding methods for
digital media and proposes a new way of watermark technique. The main objective of this work is to develop a
watermarking technique to satisfy both imperceptibility and robustness requirements. To achieve this objective
different watermarking scheme like DWT and SVD are discussed and a hybrid model of watermarking scheme
based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In our
approach, the watermark is embedded on the elements of singular values of the cover image’s DWT sub bands.
Remaining paper is organized as follows: section 2 discusses the existing related work in the field of digital
image watermarking. Section 3 explains the proposed watermarking model. Section 4 shows the result and
performance analysis. Section 5 contains conclusion.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 7 | Page
II. Related Work
2.1 Literature Review
G. Bhatnagar et.al [1] represented a reference watermarking scheme based on DWT-SVD for an image.
Here a basic idea has been given regarding this scheme. J. Sang et.al. [2] Investigated the fragility and
robustness of binary-phase only filter-based fragile/semi fragile digital image watermarking. Here main concern
is given on fragile and semi fragile digital watermarking and the robustness is been calculated. X.W Kong et.al
[7], proposed the scheme for Object Watermarks for Digital Images and Video. He proposed the SVD based
scheme for embedding the watermarks in the digital image and coloured video. Z. Xinzhong et.al. [10], has
developed A modern Digital Watermarking Algorithm Based on Improved SVD. The improved algorithm is
applied on different samples of images and verified that the improved algorithm is more robust than the
algorithm based on SVD.
2.2 Different Schemes of Watermarking
General digital watermark life-cycle phases with embedding-, attacking and detection and retrieval
functions. The information to be embedded in a signal is called a digital watermark, although in some contexts
the phrase digital watermark means the difference between the watermarked signal and the cover signal. The
signal where the watermark is to be embedded is called the host signal. A watermarking system is usually
divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host
and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is
transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an
attack. There are many possible modifications, for example, lossy compression of the data (in which resolution
is diminished), cropping an image or video or intentionally adding noise. Detection (often called extraction) is
an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was
unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital
watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if
the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change
is made to the signal.
Figure 1: Digital Watermarking Life Cycle
2.2.1 Watermarking Using DWT
Discrete wavelet transform (DWT) is a transform-domain technique where the watermark is embedded
by modulating the magnitude of coefficients in a transform domain, such as wavelet transform. Due to its
excellent spatial-frequency localization properties, the DWT is very suitable to identify areas in the cover image
where a watermark can be imperceptibly embedded. The main idea behind DWT results from multiresolution
analysis, which involves decomposition of an image in frequency channels of constant bandwidth on a
logarithmic scale. It has advantages such as similarity of data structure with respect to the resolution and
available decomposition at any level. The DWT can be implemented as a multistage transformation. An image
is decomposed into four sub bands denoted LL, LH, HL, and HH at level 1 in the DWT domain, where LH, HL
and HH represent the finest scale wavelet coefficients and LL stands for the coarse-level coefficients. The LL
sub band can further be decomposed to obtain another level of decomposition. The decomposition process
continues on the LL sub band until the desired number of levels determined by the application is reached. Since
human eyes are much more sensitive to the low-frequency part (the LL sub band), the watermark can be
embedded in the other three sub bands to maintain better image quality.
2.2.2 Watermarking Using SVD
Singular value decomposition (SVD) is a transform-domain technique where the watermark is
embedded by modulating the magnitude of coefficients in a transform domain. One of attractive mathematical
properties of SVD is that slight variations of singular values do not affect the visual perception of the cover
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 8 | Page
image, which motivates the watermark embedding procedure to achieve better transparency and robustness.
From the perspective of image processing, an image can be viewed as a matrix with nonnegative scalar entries.
The SVD of an image A with size m×m is given by A = USV T
, where U and V are orthogonal matrices, and S =
diag(λi) is a diagonal matrix of singular values λi, i = 1, . . . , m, which are arranged in decreasing order. The
columns of U are the left singular vectors, whereas the columns of V are the right singular vectors of image A.
The basic idea behind the SVD-based watermarking techniques is to find the SVD of the cover image or each
block of the cover image, and then modify the singular values to embed the watermark.
III. Proposed Hybrid Model Of Watermarking Using Dwt & Svd
In this approach, the watermark is not embedded directly on the wavelet coefficients but rather than on
the elements of singular values of the cover image’s DWT sub bands. Since performing SVD on an image is
computationally expensive, this study aims to develop a hybrid DWT-SVD based watermarking scheme that
requires less computation effort to yield better performance. After decomposing the cover image into four sub
bands by one-level DWT, we apply SVD only to the intermediate frequency sub bands and embed the
watermark into the singular values of the afore mentioned sub bands to meet the imperceptibility and robustness
requirements.
The main properties of this approach can be identified as:
 It needs less SVD computation than other methods
 Unlike most existing DWT-SVD-based algorithms, which embed singular values of the
watermark into the singular values of the cover image, our approach directly embeds the
watermark into the singular values of the cover image to better preserve the visual perceptions
of images.
The DWT-SVD watermarking scheme can be formulated as given here.
a) Watermark embedding:
1) Use one-level Haar DWT to decompose the cover image A into four sub bands (i.e., LL, LH, HL, and HH).
2) Apply SVD to LH and HL sub bands, i.e.
Ak
= Uk
Sk
V kT
, k= 1, 2 (1)
Where k represents one of two sub bands.
3) Divide the watermark into two parts:
W = W1
+W2
...Where Wk
denotes half of the watermark.
4) Modify the singular values in HL and LH sub bands with half of the watermark image and then apply SVD to
them, respectively, i.e.,
Sk
+ αWk
= (2)
Where α denotes the scale factor. The scale factor is used to Control the strength of the watermark to be
inserted.
5) Obtain the two sets of modified DWT coefficients, i.e.
A∗k
= Uk
V kT
, k= 1, 2 (3)
6) Obtain the watermarked image by performing the inverse DWT using two sets of modified DWT coefficients
and two sets of non modified DWT coefficients.
The block diagram representation of the above mentioned procedure of watermark embedding is shown
in figure 2.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 9 | Page
Figure 2: Watermark embedding
b) Watermark extraction:
1) Use one-level Haar DWT to decompose the watermarked (possibly distorted) image A∗W into four sub
bands: LL, LH, HL, and HH.
2) Apply SVD to the LH and HL sub bands, i.e.
= U∗k
V ∗kT
, k= 1, 2 (4)
Where k represents one of two sub bands.
3) Compute D∗k
= , k = 1, 2.
4) Extract half of the watermark image from each sub band, i.e.,
W∗k
= (D∗k
− Sk
)/α, k = 1, 2 (5)
5) Combine the results of Step 4 to obtain the embedded watermark:
W∗ = W∗1
+W∗2
.
The block diagram representation of the above mentioned procedure of watermark extraction is shown
in figure 3.
Figure 3: Watermark Extraction
c) Sequence Followed
The approach mainly dealt with the following items in sequence
1. Representing an image in the form of a Matrix
2. Taking out the Transformation let it be DWT or SVD
3. Embedding the watermark/secret image with the cover image to get the watermarked image
4. Neglecting fine details which also involves in elimination of noise
5. Reconstructing the watermark image from the watermarked image.
6. Calculating the PSNR for various levels of approximations and comparing them.
Transformation and Reconstruction
DWT performs wavelet decomposition of vector X with respect to a particular wavelet or particular
wavelet filters that you specify. Instead of transmitting the original matrix as a whole, proper choice of these
coefficients is made out and only selected coefficients are transmitted. The reverse procedure is carried out
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 10 | Page
while reconstructing the image. The inverse transformation is carried out for each of the available coefficients
and the representation matrix is obtained. IDWT carries out Wavelet reconstruction.
PSNR (Peak signal to noise ratio)
As a measure of the quality of a watermarked image, the peak signal-to noise ratio (PSNR) was used.
We use the PSNR as an objective means of performance. PSNR is used to measure the difference between two
images. It is defined as
PSNR=20* Log10 (b/rms)
Where b is the largest possible value of the signal (typically 255 or 1), and rms is the root mean
square difference between two images. The PSNR is given in decibel units (dB), which measure the ratio of the
peak signal and the difference between two images. An increase of 20 dB corresponds to a ten-fold decrease in
the rms difference between two images. There are many versions of signal to noise ratios, but the PSNR is very
common in image processing, probably because it gives better sounding numbers than other measures.
IV. Result And Performance Analysis
4.1 Result Using DWT Scheme of Watermarking
 The cover image and the watermark image to be watermarked are shown in the figure 4 and figure 5
respectively.
Figure 4: Original Cover Image Figure 5: Watermark Image
 The watermarked image obtained from the DWT scheme is shown in figure 6.
Figure 6: Watermarked Image Using DWT
 Figure 7 and Figure 8 represents the difference between the original cover image and the watermarked
image and key generated respectively.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 11 | Page
Figure 7: Difference Image Figure 8: Key Generated
 The calculated PSNR values in DWT scheme with different scaling factor (α) are listed in Table 1.
Table 1: PSNR values for different scaling factor in DWT scheme
4.2 Result Using SVD Scheme of Watermarking
 Figure 9 and figure 10 shows the watermarked image and watermarked with noise image after SVD
technique respectively.
Figure 9: Watermarked Image Figure 10: Watermarked and Noised Image
 The watermark image can be reconstructed from the watermarked image and the recovered
watermark image is shown in the figure 11.
Figure 11: Recovered Watermark Image
 Figure 12, 13, 14 and 15 shows the watermarking of a text file in cover image using SVD scheme of
watermarking.
α = 0.01 α = 0.05 α = 0.09
40.1538 38.8375 37.0752
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 12 | Page
Figure 12: Cover image Figure 13: Watermark to be embedded
Figure 14: Watermarked image Figure 15: Watermarked and noised image
 The watermark text can be reconstructed from the watermarked image. The recovered watermark
image is shown in the figure 16.
Figure 16: Recovered watermark image
 The calculated PSNR values in SVD scheme with different scaling factor (α) are listed in Table 2.
Table 2: PSNR values for different scaling factor in SVD scheme
4.3 Result using the hybrid DWT-SVD Scheme of Watermarking
 The figures 17 and 18 show the cover image and the gray scale converted image of the cover image
used in DWT-SVD scheme of watermarking
α = 0.01 α = 0.05 α = 0.09
40.2439 38.9437 37.0012
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 13 | Page
Figure 17: Cover image Figure 18: Gray scale converted image
 The figures 19 and 20 show the watermark image and the gray scale converted image of the watermark
image.
Figure 19: Cover image Figure 20: Gray scale converted image
 The figures 21 and 22 show the SVD image of the cover image and watermarked image after applying
DWT-SVD technique.
Figure 21: SVD image Figure 22: Watermarked image
 The calculated PSNR values in DWT-SVD scheme with different scaling factor (α) are listed in the
Table 3.
Table 3: PSNR values for different scaling factor in DWT-SVD scheme
Here three watermarking schemes namely: Watermarking using DWT, SVD and a hybrid model using
DWT & SVD are implemented and compared. Watermark extraction was performed on watermarked images
using these three models. The output images and results are observed to compare the performance of these
α = 0.01 α = 0.05 α = 0.09
40.4387 39.0513 37.1996
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using
DOI: 10.9790/2834-11110614 www.iosrjournals.org 14 | Page
schemes. The values of the scaling factors are taken as 0.01, 0.05 and 0.09 and the results are illustrated in Table
4.
WATERMARKING
SCHEME
PSNR,
WITH α =0.01
PSNR,
WITH α =0.05
PSNR,
WITH α =0.09
DWT 40.1538 38.8375 37.0752
SVD 40.2439 38.9437 37.0012
DWT-SVD 40.4387 39.0513 37.1996
Table 4: Comparison of PSNR for DWT, SVD and Hybrid model DWT-SVD Scheme of Watermarking
V. Conclusion
Hybrid image watermarking technique based on DWT and SVD has been presented, where the
watermark is embedded on the singular values of the cover image’s DWT sub bands. The technique fully
exploits the respective feature of these two transform domain methods: Spatio-frequency localization of DWT
and SVD efficiently represents intrinsic algebraic properties of an image. The results show that the proposed
hybrid DWT-SVD scheme has both the significant improvement in imperceptibility and the robustness. It is
observed that the larger the scaling factor, the stronger is the robustness of the applied watermarking scheme
and it can withstand a variety of image-processing attacks. In addition to quantitative measurement, the hybrid
model has also given better visual perceptions of the extracted watermarks. Thus the DWT-SVD hybrid model
watermarking scheme significantly outperforms the other two schemes of watermarking.
References
[1] G. Bhatnagar and B. Raman, ―A new robust reference watermarking scheme based on DWT-SVD‖,Comput. Standards Interfaces,
Sep 2009, vol. 31, no. 5, pp. 1002–1013.
[2] J. Sang and M. S. Alam, ― Fragility and robustness of binary-phase-only filter-Based fragile/semi fragile digital image
watermarking‖, IEEE Transactions on Instrumentation and Measurement, Mar. 2008, vol. 57, no. 3, pp. 595–606.
[3] H.-T. Wu and Y.M. Cheung,― Reversible watermarking by modulation and security enhancement‖, IEEE Trans. Instrum. Meas.,
Jan. 2010, vol. 59, no. 1, pp. 221–228.
[4] V. Aslantas, L. A. Dog˘an, and S. Ozturk, ―DWT-SVD based image watermarking using particle swarm optimizer,‖ in Proc. IEEE
Int. Conf. Multimedia Expo, Hannover, Germany, 2008, pp. 241–244.
[5] Doerr, G. and J. Dugelay, ―A guided tour to video watermarking. Signal Processing‖, Image Commun., 2003, 18:263-282.
[6] Chan, P. and M. Lyu,,‖A DWT-based digital video watermarking scheme with error correcting code‖. Lecture Notes Comput. Sci.,
2003.2836: 202-213. DOI: _10 1007/b13930.
[7] X.W Kong, Y. Liu, H.J Liu, and D.L Yang, "Object Watermarks for Digital Images and Video", Image and Vision Computing,
2004, Vol. 22, pp.583-595.
[8] Chien-Chuan Ko, and Bo-Zhi Yang,‖ An Integrated Technique for Video Watermarking‖, 6th IEEE/ACIS International
Conference on Computer and Information Science (ICIS 2007).
[9] J. M. Shieh ,D. C. Lou ,M. C. Chang, ―A Semi-Blind Digital Watermarking Scheme Based on Singular Value Decomposition,‖
Journal of Computer Standards & Interfaces, 2006, vol. 28, no. 4, pp. 428–440.
[10] Z. Xinzhong , Z. Jianmin, X. Huiying , ―A Digital Watermarking Algorithm and Implementation Based on Improved SVD,‖ The
18th
International Conference on Pattern Recognition (ICPR’06), 2006, vol. 3, pp.651–656.
[11] Chang, C., P. Tsai and C. Lin,‖SVD-based digital image watermarking scheme.‖ Patt. Recog. Lett., 26: 1577-1586.
DOI:10.1016/j.patrec.2005.01.00411, 2005.
[12] R. Liu, and T. Tan, ―An SVD-Based Watermarking Scheme for Protecting Rightful Ownership‖, IEEE Transactions on Multimedia,
2002, vol. 4, pp. 121–128.
[13] M Ali and CW Ahn, ―An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain‖, Signal
Processing, Elsevier, vol. 94, 2014, pp 545–556.
[14] N.M. Makbol, B.E. Khoo,‖ Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and
Singular Value Decomposition‖, AEU—International Journal of Electronics and Communications, 67 (2) (2013), pp. 102–112.
[15] X. Wu, W. Sun,‖ Robust copyright protection scheme for digital images using overlapping DCT and SVD‖, Applied Soft
Computing, 13 (2) (2013), pp. 1170–1182.

More Related Content

What's hot

Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...Iftikhar Ahmad
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniquesabhijeetmi90
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingParag Agarwal
 

What's hot (18)

robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
dwm
dwmdwm
dwm
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...
 
1709 1715
1709 17151709 1715
1709 1715
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniques
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Viewers also liked

Intern finalpresentation part4
Intern finalpresentation part4Intern finalpresentation part4
Intern finalpresentation part4Joseph Burtoni
 
Intern finalpresentation part7
Intern finalpresentation part7Intern finalpresentation part7
Intern finalpresentation part7Joseph Burtoni
 
Perfiles longitudinales revista
Perfiles longitudinales revistaPerfiles longitudinales revista
Perfiles longitudinales revistacarsig
 
North Drilling Brochure
North Drilling BrochureNorth Drilling Brochure
North Drilling BrochureLori Chalykoff
 
Sports writing by valeriefulgar
Sports writing by valeriefulgarSports writing by valeriefulgar
Sports writing by valeriefulgarKimberly Magdaong
 
8TRENDS - Series of Articles
8TRENDS - Series of Articles8TRENDS - Series of Articles
8TRENDS - Series of ArticlesPieter Bailleul
 
Customer preferance towards real estate with special to aarvanss referance
Customer preferance towards real estate with special to aarvanss referanceCustomer preferance towards real estate with special to aarvanss referance
Customer preferance towards real estate with special to aarvanss referanceRam Babu
 
Lecture Notes, Event Management class 2 1-17
Lecture Notes, Event Management class 2 1-17Lecture Notes, Event Management class 2 1-17
Lecture Notes, Event Management class 2 1-17Game Day Communications
 

Viewers also liked (13)

.
..
.
 
Intern finalpresentation part4
Intern finalpresentation part4Intern finalpresentation part4
Intern finalpresentation part4
 
Intern finalpresentation part7
Intern finalpresentation part7Intern finalpresentation part7
Intern finalpresentation part7
 
7minutes
7minutes7minutes
7minutes
 
Perfiles longitudinales revista
Perfiles longitudinales revistaPerfiles longitudinales revista
Perfiles longitudinales revista
 
References
ReferencesReferences
References
 
Resume
ResumeResume
Resume
 
North Drilling Brochure
North Drilling BrochureNorth Drilling Brochure
North Drilling Brochure
 
Sports writing by valeriefulgar
Sports writing by valeriefulgarSports writing by valeriefulgar
Sports writing by valeriefulgar
 
8TRENDS - Series of Articles
8TRENDS - Series of Articles8TRENDS - Series of Articles
8TRENDS - Series of Articles
 
Customer preferance towards real estate with special to aarvanss referance
Customer preferance towards real estate with special to aarvanss referanceCustomer preferance towards real estate with special to aarvanss referance
Customer preferance towards real estate with special to aarvanss referance
 
Lecture Notes, Event Management class 2 1-17
Lecture Notes, Event Management class 2 1-17Lecture Notes, Event Management class 2 1-17
Lecture Notes, Event Management class 2 1-17
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 

Similar to A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Discrete Wavelet Transform and Singular Value Decomposition

A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 

Similar to A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Discrete Wavelet Transform and Singular Value Decomposition (20)

A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
E04122330
E04122330E04122330
E04122330
 
1709 1715
1709 17151709 1715
1709 1715
 
1918 1923
1918 19231918 1923
1918 1923
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
50120130406038
5012013040603850120130406038
50120130406038
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Discrete Wavelet Transform and Singular Value Decomposition

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. I (Jan. - Feb .2016), PP 06-14 www.iosrjournals.org DOI: 10.9790/2834-11110614 www.iosrjournals.org 6 | Page A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Discrete Wavelet Transform and Singular Value Decomposition Sukanta Kumar Tulo, Dr. Nalinikanta Barpanda, Subhrajit Pradhan, A. Amiya Kumar Gupta Department of Electronics Engineering, GIET, GUNUPUR, INDIA Abstract: Digital Watermarking is a process of embedding information in the multimedia content (host or cover image) for image authentication. An ideal watermarking system would embed an amount of information that could not be removed or altered without making the cover object entirely unusable. Over the past few years digital watermarking has become popular due to its significance in content authentication and legal ownership for digital multimedia data. A digital watermark is a sequence of information containing the owner’s copyright. It is inserted invisibly in another image so that it can be extracted at later times for the evidence of rightful ownership. Available digital watermarking techniques can be categorized into one of the two domains, viz., spatial and transform, according to the embedding domain of the host image. Based on these domains digital watermarking can be done by FFT, DCT, DWT, SVD. The analysis proves that the proposed DWT-SVD hybrid model is much more superior to other models as it is found to be more robust and effective. The results revealed that the hybrid model is able to withstand a variety of attacks and shows high level of security. Keywords: Digital Watermarking, Discrete Wavelet Transform, Hybrid model, Singular Value Decomposition, Peak Signal to Noise Ratio (PSNR). I. Introduction The growth of digital media and the fact that unlimited numbers of perfect copies of such media can be illegally produced is a threat to the rights of content owners. A copy of digital media is an exact duplicate of the original. The authors of a work are hesitant to make such information available on the Internet as it may be copied and retransmitted without the permission of the author. An issue facing electronic commerce on the Internet for digital information is how to protect the copyright and intellectual property rights of those who legally own or posses’ digital works. Copyright protection involves ownership authentication and can be used to identify illegal copies. One approach to copyrighting is to mark works by adding information about their relationship to the owner by a digital watermark. Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners, in the same manner as paper bearing a watermark for visible identification. In digital watermarking, the signal may be audio, pictures, or video. This information may be perceptible or imperceptible to the human senses. Early watermarking work investigated how documents can be marked so they can be traced in the photocopy process. If the signal is copied, then the information also is carried in the copy. A signal may carry several different watermarks at the same time. In visible digital watermarking, the information is visible in the picture or video. Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark. In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden in the signal). The watermark may be intended for widespread use and thus, is made easy to retrieve or, it may be a form of Steganography, where a party communicates a secret message embedded in the digital signal. Digital watermarks are employed in an attempt to provide proof of ownership and identify illicit copying and distribution of multimedia information. This contributes an overview of information hiding methods for digital media and proposes a new way of watermark technique. The main objective of this work is to develop a watermarking technique to satisfy both imperceptibility and robustness requirements. To achieve this objective different watermarking scheme like DWT and SVD are discussed and a hybrid model of watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In our approach, the watermark is embedded on the elements of singular values of the cover image’s DWT sub bands. Remaining paper is organized as follows: section 2 discusses the existing related work in the field of digital image watermarking. Section 3 explains the proposed watermarking model. Section 4 shows the result and performance analysis. Section 5 contains conclusion.
  • 2. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 7 | Page II. Related Work 2.1 Literature Review G. Bhatnagar et.al [1] represented a reference watermarking scheme based on DWT-SVD for an image. Here a basic idea has been given regarding this scheme. J. Sang et.al. [2] Investigated the fragility and robustness of binary-phase only filter-based fragile/semi fragile digital image watermarking. Here main concern is given on fragile and semi fragile digital watermarking and the robustness is been calculated. X.W Kong et.al [7], proposed the scheme for Object Watermarks for Digital Images and Video. He proposed the SVD based scheme for embedding the watermarks in the digital image and coloured video. Z. Xinzhong et.al. [10], has developed A modern Digital Watermarking Algorithm Based on Improved SVD. The improved algorithm is applied on different samples of images and verified that the improved algorithm is more robust than the algorithm based on SVD. 2.2 Different Schemes of Watermarking General digital watermark life-cycle phases with embedding-, attacking and detection and retrieval functions. The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. There are many possible modifications, for example, lossy compression of the data (in which resolution is diminished), cropping an image or video or intentionally adding noise. Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change is made to the signal. Figure 1: Digital Watermarking Life Cycle 2.2.1 Watermarking Using DWT Discrete wavelet transform (DWT) is a transform-domain technique where the watermark is embedded by modulating the magnitude of coefficients in a transform domain, such as wavelet transform. Due to its excellent spatial-frequency localization properties, the DWT is very suitable to identify areas in the cover image where a watermark can be imperceptibly embedded. The main idea behind DWT results from multiresolution analysis, which involves decomposition of an image in frequency channels of constant bandwidth on a logarithmic scale. It has advantages such as similarity of data structure with respect to the resolution and available decomposition at any level. The DWT can be implemented as a multistage transformation. An image is decomposed into four sub bands denoted LL, LH, HL, and HH at level 1 in the DWT domain, where LH, HL and HH represent the finest scale wavelet coefficients and LL stands for the coarse-level coefficients. The LL sub band can further be decomposed to obtain another level of decomposition. The decomposition process continues on the LL sub band until the desired number of levels determined by the application is reached. Since human eyes are much more sensitive to the low-frequency part (the LL sub band), the watermark can be embedded in the other three sub bands to maintain better image quality. 2.2.2 Watermarking Using SVD Singular value decomposition (SVD) is a transform-domain technique where the watermark is embedded by modulating the magnitude of coefficients in a transform domain. One of attractive mathematical properties of SVD is that slight variations of singular values do not affect the visual perception of the cover
  • 3. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 8 | Page image, which motivates the watermark embedding procedure to achieve better transparency and robustness. From the perspective of image processing, an image can be viewed as a matrix with nonnegative scalar entries. The SVD of an image A with size m×m is given by A = USV T , where U and V are orthogonal matrices, and S = diag(λi) is a diagonal matrix of singular values λi, i = 1, . . . , m, which are arranged in decreasing order. The columns of U are the left singular vectors, whereas the columns of V are the right singular vectors of image A. The basic idea behind the SVD-based watermarking techniques is to find the SVD of the cover image or each block of the cover image, and then modify the singular values to embed the watermark. III. Proposed Hybrid Model Of Watermarking Using Dwt & Svd In this approach, the watermark is not embedded directly on the wavelet coefficients but rather than on the elements of singular values of the cover image’s DWT sub bands. Since performing SVD on an image is computationally expensive, this study aims to develop a hybrid DWT-SVD based watermarking scheme that requires less computation effort to yield better performance. After decomposing the cover image into four sub bands by one-level DWT, we apply SVD only to the intermediate frequency sub bands and embed the watermark into the singular values of the afore mentioned sub bands to meet the imperceptibility and robustness requirements. The main properties of this approach can be identified as:  It needs less SVD computation than other methods  Unlike most existing DWT-SVD-based algorithms, which embed singular values of the watermark into the singular values of the cover image, our approach directly embeds the watermark into the singular values of the cover image to better preserve the visual perceptions of images. The DWT-SVD watermarking scheme can be formulated as given here. a) Watermark embedding: 1) Use one-level Haar DWT to decompose the cover image A into four sub bands (i.e., LL, LH, HL, and HH). 2) Apply SVD to LH and HL sub bands, i.e. Ak = Uk Sk V kT , k= 1, 2 (1) Where k represents one of two sub bands. 3) Divide the watermark into two parts: W = W1 +W2 ...Where Wk denotes half of the watermark. 4) Modify the singular values in HL and LH sub bands with half of the watermark image and then apply SVD to them, respectively, i.e., Sk + αWk = (2) Where α denotes the scale factor. The scale factor is used to Control the strength of the watermark to be inserted. 5) Obtain the two sets of modified DWT coefficients, i.e. A∗k = Uk V kT , k= 1, 2 (3) 6) Obtain the watermarked image by performing the inverse DWT using two sets of modified DWT coefficients and two sets of non modified DWT coefficients. The block diagram representation of the above mentioned procedure of watermark embedding is shown in figure 2.
  • 4. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 9 | Page Figure 2: Watermark embedding b) Watermark extraction: 1) Use one-level Haar DWT to decompose the watermarked (possibly distorted) image A∗W into four sub bands: LL, LH, HL, and HH. 2) Apply SVD to the LH and HL sub bands, i.e. = U∗k V ∗kT , k= 1, 2 (4) Where k represents one of two sub bands. 3) Compute D∗k = , k = 1, 2. 4) Extract half of the watermark image from each sub band, i.e., W∗k = (D∗k − Sk )/α, k = 1, 2 (5) 5) Combine the results of Step 4 to obtain the embedded watermark: W∗ = W∗1 +W∗2 . The block diagram representation of the above mentioned procedure of watermark extraction is shown in figure 3. Figure 3: Watermark Extraction c) Sequence Followed The approach mainly dealt with the following items in sequence 1. Representing an image in the form of a Matrix 2. Taking out the Transformation let it be DWT or SVD 3. Embedding the watermark/secret image with the cover image to get the watermarked image 4. Neglecting fine details which also involves in elimination of noise 5. Reconstructing the watermark image from the watermarked image. 6. Calculating the PSNR for various levels of approximations and comparing them. Transformation and Reconstruction DWT performs wavelet decomposition of vector X with respect to a particular wavelet or particular wavelet filters that you specify. Instead of transmitting the original matrix as a whole, proper choice of these coefficients is made out and only selected coefficients are transmitted. The reverse procedure is carried out
  • 5. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 10 | Page while reconstructing the image. The inverse transformation is carried out for each of the available coefficients and the representation matrix is obtained. IDWT carries out Wavelet reconstruction. PSNR (Peak signal to noise ratio) As a measure of the quality of a watermarked image, the peak signal-to noise ratio (PSNR) was used. We use the PSNR as an objective means of performance. PSNR is used to measure the difference between two images. It is defined as PSNR=20* Log10 (b/rms) Where b is the largest possible value of the signal (typically 255 or 1), and rms is the root mean square difference between two images. The PSNR is given in decibel units (dB), which measure the ratio of the peak signal and the difference between two images. An increase of 20 dB corresponds to a ten-fold decrease in the rms difference between two images. There are many versions of signal to noise ratios, but the PSNR is very common in image processing, probably because it gives better sounding numbers than other measures. IV. Result And Performance Analysis 4.1 Result Using DWT Scheme of Watermarking  The cover image and the watermark image to be watermarked are shown in the figure 4 and figure 5 respectively. Figure 4: Original Cover Image Figure 5: Watermark Image  The watermarked image obtained from the DWT scheme is shown in figure 6. Figure 6: Watermarked Image Using DWT  Figure 7 and Figure 8 represents the difference between the original cover image and the watermarked image and key generated respectively.
  • 6. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 11 | Page Figure 7: Difference Image Figure 8: Key Generated  The calculated PSNR values in DWT scheme with different scaling factor (α) are listed in Table 1. Table 1: PSNR values for different scaling factor in DWT scheme 4.2 Result Using SVD Scheme of Watermarking  Figure 9 and figure 10 shows the watermarked image and watermarked with noise image after SVD technique respectively. Figure 9: Watermarked Image Figure 10: Watermarked and Noised Image  The watermark image can be reconstructed from the watermarked image and the recovered watermark image is shown in the figure 11. Figure 11: Recovered Watermark Image  Figure 12, 13, 14 and 15 shows the watermarking of a text file in cover image using SVD scheme of watermarking. α = 0.01 α = 0.05 α = 0.09 40.1538 38.8375 37.0752
  • 7. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 12 | Page Figure 12: Cover image Figure 13: Watermark to be embedded Figure 14: Watermarked image Figure 15: Watermarked and noised image  The watermark text can be reconstructed from the watermarked image. The recovered watermark image is shown in the figure 16. Figure 16: Recovered watermark image  The calculated PSNR values in SVD scheme with different scaling factor (α) are listed in Table 2. Table 2: PSNR values for different scaling factor in SVD scheme 4.3 Result using the hybrid DWT-SVD Scheme of Watermarking  The figures 17 and 18 show the cover image and the gray scale converted image of the cover image used in DWT-SVD scheme of watermarking α = 0.01 α = 0.05 α = 0.09 40.2439 38.9437 37.0012
  • 8. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 13 | Page Figure 17: Cover image Figure 18: Gray scale converted image  The figures 19 and 20 show the watermark image and the gray scale converted image of the watermark image. Figure 19: Cover image Figure 20: Gray scale converted image  The figures 21 and 22 show the SVD image of the cover image and watermarked image after applying DWT-SVD technique. Figure 21: SVD image Figure 22: Watermarked image  The calculated PSNR values in DWT-SVD scheme with different scaling factor (α) are listed in the Table 3. Table 3: PSNR values for different scaling factor in DWT-SVD scheme Here three watermarking schemes namely: Watermarking using DWT, SVD and a hybrid model using DWT & SVD are implemented and compared. Watermark extraction was performed on watermarked images using these three models. The output images and results are observed to compare the performance of these α = 0.01 α = 0.05 α = 0.09 40.4387 39.0513 37.1996
  • 9. A Hybrid Model of Watermarking Scheme for Color Image Authentication Using DOI: 10.9790/2834-11110614 www.iosrjournals.org 14 | Page schemes. The values of the scaling factors are taken as 0.01, 0.05 and 0.09 and the results are illustrated in Table 4. WATERMARKING SCHEME PSNR, WITH α =0.01 PSNR, WITH α =0.05 PSNR, WITH α =0.09 DWT 40.1538 38.8375 37.0752 SVD 40.2439 38.9437 37.0012 DWT-SVD 40.4387 39.0513 37.1996 Table 4: Comparison of PSNR for DWT, SVD and Hybrid model DWT-SVD Scheme of Watermarking V. Conclusion Hybrid image watermarking technique based on DWT and SVD has been presented, where the watermark is embedded on the singular values of the cover image’s DWT sub bands. The technique fully exploits the respective feature of these two transform domain methods: Spatio-frequency localization of DWT and SVD efficiently represents intrinsic algebraic properties of an image. The results show that the proposed hybrid DWT-SVD scheme has both the significant improvement in imperceptibility and the robustness. It is observed that the larger the scaling factor, the stronger is the robustness of the applied watermarking scheme and it can withstand a variety of image-processing attacks. In addition to quantitative measurement, the hybrid model has also given better visual perceptions of the extracted watermarks. Thus the DWT-SVD hybrid model watermarking scheme significantly outperforms the other two schemes of watermarking. References [1] G. Bhatnagar and B. Raman, ―A new robust reference watermarking scheme based on DWT-SVD‖,Comput. Standards Interfaces, Sep 2009, vol. 31, no. 5, pp. 1002–1013. [2] J. Sang and M. S. Alam, ― Fragility and robustness of binary-phase-only filter-Based fragile/semi fragile digital image watermarking‖, IEEE Transactions on Instrumentation and Measurement, Mar. 2008, vol. 57, no. 3, pp. 595–606. [3] H.-T. Wu and Y.M. Cheung,― Reversible watermarking by modulation and security enhancement‖, IEEE Trans. Instrum. Meas., Jan. 2010, vol. 59, no. 1, pp. 221–228. [4] V. Aslantas, L. A. Dog˘an, and S. Ozturk, ―DWT-SVD based image watermarking using particle swarm optimizer,‖ in Proc. IEEE Int. Conf. Multimedia Expo, Hannover, Germany, 2008, pp. 241–244. [5] Doerr, G. and J. Dugelay, ―A guided tour to video watermarking. Signal Processing‖, Image Commun., 2003, 18:263-282. [6] Chan, P. and M. Lyu,,‖A DWT-based digital video watermarking scheme with error correcting code‖. Lecture Notes Comput. Sci., 2003.2836: 202-213. DOI: _10 1007/b13930. [7] X.W Kong, Y. Liu, H.J Liu, and D.L Yang, "Object Watermarks for Digital Images and Video", Image and Vision Computing, 2004, Vol. 22, pp.583-595. [8] Chien-Chuan Ko, and Bo-Zhi Yang,‖ An Integrated Technique for Video Watermarking‖, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). [9] J. M. Shieh ,D. C. Lou ,M. C. Chang, ―A Semi-Blind Digital Watermarking Scheme Based on Singular Value Decomposition,‖ Journal of Computer Standards & Interfaces, 2006, vol. 28, no. 4, pp. 428–440. [10] Z. Xinzhong , Z. Jianmin, X. Huiying , ―A Digital Watermarking Algorithm and Implementation Based on Improved SVD,‖ The 18th International Conference on Pattern Recognition (ICPR’06), 2006, vol. 3, pp.651–656. [11] Chang, C., P. Tsai and C. Lin,‖SVD-based digital image watermarking scheme.‖ Patt. Recog. Lett., 26: 1577-1586. DOI:10.1016/j.patrec.2005.01.00411, 2005. [12] R. Liu, and T. Tan, ―An SVD-Based Watermarking Scheme for Protecting Rightful Ownership‖, IEEE Transactions on Multimedia, 2002, vol. 4, pp. 121–128. [13] M Ali and CW Ahn, ―An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain‖, Signal Processing, Elsevier, vol. 94, 2014, pp 545–556. [14] N.M. Makbol, B.E. Khoo,‖ Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition‖, AEU—International Journal of Electronics and Communications, 67 (2) (2013), pp. 102–112. [15] X. Wu, W. Sun,‖ Robust copyright protection scheme for digital images using overlapping DCT and SVD‖, Applied Soft Computing, 13 (2) (2013), pp. 1170–1182.