Digital watermark technology hides copyright information in digital images, effectively protecting the
copyright of digital images. At present, the color image digital watermarking algorithm still has defects
such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the
above problems, this paper studies the digital watermarking method based on discrete wavelet transform
and discrete cosine transform. Then this paper proposes a color image blind digital watermarking
algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y
component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and
perform the discrete cosine transform. finally, use the embedding method to convert the watermark
information after the Arnold transform embedded in the block. The experimental results show that the
PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being
attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm
has good robustness and can achieve watermarking blind extraction.
This document proposes a new digital watermarking technique that utilizes Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), and Arnold Transform. It embeds a watermark image into the high frequency subbands of a cover image after applying DWT and SVD. During extraction, the receiver applies the same transforms to extract the watermark. The technique aims to provide improved robustness against various attacks like noise, compression, filtering etc. compared to existing techniques that use these transforms individually or in pairs. The document analyzes the proposed technique's performance based on the extracted watermark's peak signal-to-noise ratio after subjecting the watermarked image to different attacks.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
International Journal for Research in Applied Science & Engineeringpriyanka singh
This document describes a method for embedding a secret watermark image into a QR code image using discrete wavelet transform. The watermark embedding process involves:
1) Performing a two-level discrete wavelet transform on the QR code image to create sub-bands
2) Converting the watermark image (e.g. a logo) to a binary sequence and generating a pseudo-random sequence with a secret key
3) Embedding the watermark bits into one of the high frequency sub-bands by modifying pixel values
4) Performing inverse discrete wavelet transform to get the watermarked QR code image
The watermark can then be extracted without the original QR code by estimating the original pixel values and
The growing trend of online image sharing and downloads today mandate the need for better encoding and
decoding scheme. This paper looks into this issue of image coding. Multiple Description Coding is an
encoding and decoding scheme that is specially designed in providing more error resilience for data
transmission. The main issue of Multiple Description Coding is the lossy transmission channels. This work
attempts to address the issue of re-constructing high quality image with the use of just one descriptor
rather than the conventional descriptor. This work compare the use of Type I quantizer and Type II
quantizer. We propose and compare 4 coders by examining the quality of re-constructed images. The 4
coders are namely JPEG HH (Horizontal Pixel Interleaving with Huffman Coding) model, JPEG HA
(Horizontal Pixel Interleaving with Arithmetic Encoding) model, JPEG VH (Vertical Pixel Interleaving
with Huffman Encoding) model, and JPEG VA (Vertical Pixel Interleaving with Arithmetic Encoding)
model. The findings suggest that the use of horizontal and vertical pixel interleavings do not affect the
results much. Whereas the choice of quantizer greatly affect its performance.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Region Based Undectable Multiple Image WatermarkingShalu Singh
The document proposes a region-based multiple image watermarking technique. It divides an image into two regions - Region A and Region B. A watermark is inserted into Region A using LSB insertion and into Region B by applying DWT, DFT, and inserting two watermarks into frequency coefficients. The watermarks can be extracted from the two regions using the reverse process. The technique aims to make watermarks more secure and undetectable by inserting them into different image regions and domains.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
Commutative approach for securing digital mediaijctet
This document summarizes a paper on digital image watermarking techniques. It discusses how digital watermarking can be used to embed hidden information in multimedia data like images, audio, and video to identify ownership and protect against illegal copying. It describes different watermarking techniques including the discrete cosine transform (DCT) and discrete wavelet transform (DWT). The paper analyzes the DCT and DWT techniques, evaluating them using peak signal-to-noise ratio at different threshold values. It finds that the DWT technique provides better image quality than DCT. The document also discusses applications of digital watermarking like ownership assertion, fingerprinting, copy prevention and control, fraud detection, and ID card security.
This document proposes a new digital watermarking technique that utilizes Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), and Arnold Transform. It embeds a watermark image into the high frequency subbands of a cover image after applying DWT and SVD. During extraction, the receiver applies the same transforms to extract the watermark. The technique aims to provide improved robustness against various attacks like noise, compression, filtering etc. compared to existing techniques that use these transforms individually or in pairs. The document analyzes the proposed technique's performance based on the extracted watermark's peak signal-to-noise ratio after subjecting the watermarked image to different attacks.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
International Journal for Research in Applied Science & Engineeringpriyanka singh
This document describes a method for embedding a secret watermark image into a QR code image using discrete wavelet transform. The watermark embedding process involves:
1) Performing a two-level discrete wavelet transform on the QR code image to create sub-bands
2) Converting the watermark image (e.g. a logo) to a binary sequence and generating a pseudo-random sequence with a secret key
3) Embedding the watermark bits into one of the high frequency sub-bands by modifying pixel values
4) Performing inverse discrete wavelet transform to get the watermarked QR code image
The watermark can then be extracted without the original QR code by estimating the original pixel values and
The growing trend of online image sharing and downloads today mandate the need for better encoding and
decoding scheme. This paper looks into this issue of image coding. Multiple Description Coding is an
encoding and decoding scheme that is specially designed in providing more error resilience for data
transmission. The main issue of Multiple Description Coding is the lossy transmission channels. This work
attempts to address the issue of re-constructing high quality image with the use of just one descriptor
rather than the conventional descriptor. This work compare the use of Type I quantizer and Type II
quantizer. We propose and compare 4 coders by examining the quality of re-constructed images. The 4
coders are namely JPEG HH (Horizontal Pixel Interleaving with Huffman Coding) model, JPEG HA
(Horizontal Pixel Interleaving with Arithmetic Encoding) model, JPEG VH (Vertical Pixel Interleaving
with Huffman Encoding) model, and JPEG VA (Vertical Pixel Interleaving with Arithmetic Encoding)
model. The findings suggest that the use of horizontal and vertical pixel interleavings do not affect the
results much. Whereas the choice of quantizer greatly affect its performance.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Region Based Undectable Multiple Image WatermarkingShalu Singh
The document proposes a region-based multiple image watermarking technique. It divides an image into two regions - Region A and Region B. A watermark is inserted into Region A using LSB insertion and into Region B by applying DWT, DFT, and inserting two watermarks into frequency coefficients. The watermarks can be extracted from the two regions using the reverse process. The technique aims to make watermarks more secure and undetectable by inserting them into different image regions and domains.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
Commutative approach for securing digital mediaijctet
This document summarizes a paper on digital image watermarking techniques. It discusses how digital watermarking can be used to embed hidden information in multimedia data like images, audio, and video to identify ownership and protect against illegal copying. It describes different watermarking techniques including the discrete cosine transform (DCT) and discrete wavelet transform (DWT). The paper analyzes the DCT and DWT techniques, evaluating them using peak signal-to-noise ratio at different threshold values. It finds that the DWT technique provides better image quality than DCT. The document also discusses applications of digital watermarking like ownership assertion, fingerprinting, copy prevention and control, fraud detection, and ID card security.
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
This document proposes a robust deinterlacing multiple image watermarking technique in the discrete wavelet transform (DWT) domain. The proposed method embeds two watermarks into an image by first deinterlacing the low-low subband of the DWT and then inserting the watermarks. Experimental results on Lena, Goldhill and Boat images show the technique increases watermark security and robustness against attacks as the level of DWT decomposition increases, while maintaining invisibility and similarity between original and extracted watermarks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
Colored Image Watermarking Technique Based on HVS using HSV Color ModelIDES Editor
The Human Visual System is found to be less
sensitive to the highly textured area of the image. Moreover,
in all colours the blue is least sensitive to the HVS (Human
Visual System). While working on colored images when using
the mathematical and biological models of HVS, the preferred
colour model must be HSV (Hue, Saturation and Value) colour
model rather than RGB colour model because it most closely
defines how the image is interpreted by HVS. The high visual
transparency in the technique is achieved by making use of
highly textured block in luminance channel for watermark
insertion. Moreover, the choice of selecting appropriate area
for watermark insertion is also influenced by making use of
‘Hue’ property of the image in the chrominance channel to
enhance the visual transparency even more. Watermark is
made highly robust against different types of attacks by
performing the watermark insertion in transformed domain
and making use of the transformation functions such as DWT,
DCT and SVD. The results demonstrated the robustness of
the technique against various types of attacks and comparison
through aforesaid results the technique is proven to be more
robust against previous techniques making use of HSI colour
model.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
This document provides an overview of digital watermarking techniques. It discusses how watermarking has evolved from earlier steganography methods and classifications of watermarking such as image, audio, and video watermarking. It also summarizes various watermarking techniques including spatial domain methods that directly modify pixel values, frequency domain methods that operate in transform domains like DCT and DWT, and spread spectrum techniques. Specific spatial and frequency domain techniques are described for image, audio, and video watermarking. The document concludes that watermarking continues to be an evolving topic with opportunities remaining to further develop fragile and semi-fragile techniques.
This document discusses different techniques for digital image watermarking, including in the spatial and frequency domains. It provides an overview of watermarking concepts and applications. It then describes two watermarking algorithms - one that embeds watermarks in the spatial domain by modifying pixel intensities in selected image blocks, and another that embeds watermarks in the wavelet domain by modifying selected wavelet coefficients. Both algorithms are described step-by-step and include watermark insertion and extraction procedures. Results are provided showing the performance of the algorithms under different attacks in terms of normalized cross-correlation between the original and extracted watermarks.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document proposes a new digital watermarking technique that uses a combination of Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), and Arnold Transform. It embeds a watermark into the high frequency DWT subbands of an image by modifying the SVD singular values. During extraction, the receiver applies DWT, SVD, and Arnold Transform in reverse order to recover the watermark. The technique aims to provide improved robustness against various attacks like noise, compression, and image processing operations. The document evaluates the proposed technique on standard test images and finds it achieves good imperceptibility and resistance to cropping, rotation, noise, filtering, compression, and
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
This document proposes a robust deinterlacing multiple image watermarking technique in the discrete wavelet transform (DWT) domain. The proposed method embeds two watermarks into an image by first deinterlacing the low-low subband of the DWT and then inserting the watermarks. Experimental results on Lena, Goldhill and Boat images show the technique increases watermark security and robustness against attacks as the level of DWT decomposition increases, while maintaining invisibility and similarity between original and extracted watermarks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
Colored Image Watermarking Technique Based on HVS using HSV Color ModelIDES Editor
The Human Visual System is found to be less
sensitive to the highly textured area of the image. Moreover,
in all colours the blue is least sensitive to the HVS (Human
Visual System). While working on colored images when using
the mathematical and biological models of HVS, the preferred
colour model must be HSV (Hue, Saturation and Value) colour
model rather than RGB colour model because it most closely
defines how the image is interpreted by HVS. The high visual
transparency in the technique is achieved by making use of
highly textured block in luminance channel for watermark
insertion. Moreover, the choice of selecting appropriate area
for watermark insertion is also influenced by making use of
‘Hue’ property of the image in the chrominance channel to
enhance the visual transparency even more. Watermark is
made highly robust against different types of attacks by
performing the watermark insertion in transformed domain
and making use of the transformation functions such as DWT,
DCT and SVD. The results demonstrated the robustness of
the technique against various types of attacks and comparison
through aforesaid results the technique is proven to be more
robust against previous techniques making use of HSI colour
model.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
it is used for security purpose using two level dct and wavelet packet denoising .based on digital image processing.the software based on matlab.it is used for high security purpose.
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
This document provides an overview of digital watermarking techniques. It discusses how watermarking has evolved from earlier steganography methods and classifications of watermarking such as image, audio, and video watermarking. It also summarizes various watermarking techniques including spatial domain methods that directly modify pixel values, frequency domain methods that operate in transform domains like DCT and DWT, and spread spectrum techniques. Specific spatial and frequency domain techniques are described for image, audio, and video watermarking. The document concludes that watermarking continues to be an evolving topic with opportunities remaining to further develop fragile and semi-fragile techniques.
This document discusses different techniques for digital image watermarking, including in the spatial and frequency domains. It provides an overview of watermarking concepts and applications. It then describes two watermarking algorithms - one that embeds watermarks in the spatial domain by modifying pixel intensities in selected image blocks, and another that embeds watermarks in the wavelet domain by modifying selected wavelet coefficients. Both algorithms are described step-by-step and include watermark insertion and extraction procedures. Results are provided showing the performance of the algorithms under different attacks in terms of normalized cross-correlation between the original and extracted watermarks.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document proposes a new digital watermarking technique that uses a combination of Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), and Arnold Transform. It embeds a watermark into the high frequency DWT subbands of an image by modifying the SVD singular values. During extraction, the receiver applies DWT, SVD, and Arnold Transform in reverse order to recover the watermark. The technique aims to provide improved robustness against various attacks like noise, compression, and image processing operations. The document evaluates the proposed technique on standard test images and finds it achieves good imperceptibility and resistance to cropping, rotation, noise, filtering, compression, and
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document proposes a hybrid digital watermarking scheme that uses both discrete wavelet transform (DWT) and singular value decomposition (SVD) for color image authentication.
2) In the proposed scheme, the watermark is embedded in the singular values of the DWT sub-bands of the cover image, rather than directly on the wavelet coefficients. This reduces computational expense compared to other DWT-SVD methods.
3) Experimental results on test images show that the hybrid DWT-SVD scheme provides better imperceptibility and robustness against various attacks compared to using DWT or SVD alone. The recovered watermarks had high quality even after the watermarked images were distorted.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
In this paper, a semi-blind watermarking technique of embedding the color watermark using curvelet
coefficient in RGB cover image has been proposed. The technique used the concept of HVS that the human
eyes are not much sensitive to blue color. So the blue color plane of the cover image is used as embedding
domain. A bit planes method is also used, the most significant bit (MSB) plane of watermark image is used
as embedding information. Selected scale and orientation of the curvelet coefficients of the blue channel in
the cover image has been used for embedding the watermark information. All other 0-7 bit planes are used
as a key at the time of extraction. The results of the watermarking scheme have been analyzed by different
quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index
Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of
watermark, quality of extracted watermark and robustness against different attacks.
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
In this paper, a semi-blind watermarking technique of embedding the color watermark using curvelet coefficient in RGB cover image has been proposed. The technique used the concept of HVS that the human eyes are not much sensitive to blue color. So the blue color plane of the cover image is used as embedding domain. A bit planes method is also used, the most significant bit (MSB) plane of watermark image is used
as embedding information. Selected scale and orientation of the curvelet coefficients of the blue channel in the cover image has been used for embedding the watermark information. All other 0-7 bit planes are used as a key at the time of extraction. The results of the watermarking scheme have been analyzed by different quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of watermark, quality of extracted watermark and robustness against different attacks.
This document presents an algorithm for imperceptibly embedding a DNA-encoded watermark into a color image for authentication purposes. It applies a multi-resolution discrete wavelet transform to decompose the image. The watermark, encoded into DNA nucleotides, is then embedded into the third-level wavelet coefficients through a quantization process. Specifically, the watermark nucleotides are complemented and used to quantize coefficients in the middle frequency band, modifying the coefficients. The watermarked image is reconstructed through inverse wavelet transform. Extraction reverses these steps to recover the watermark without the original image. The algorithm aims to balance imperceptibility and robustness through this wavelet-based, blind watermarking scheme.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A novel attack detection technique to find attack in watermarked images with ...prjpublications
The document describes a novel technique for detecting attacks on watermarked images. The technique uses Peak Signal-to-Noise Ratio (PSNR) and RGB color intensity values to analyze differences between an original watermarked image and a tested watermarked image. If the PSNR value is above a threshold, the images are considered identical. Otherwise, RGB intensity levels are compared. A match suggests no attack, while a mismatch identifies an attacked image and the type of attack applied. The technique is demonstrated by hiding data in an image, applying attacks, and correctly detecting the attacks based on PSNR and RGB analyses. Evaluation shows the approach effectively identifies various watermark attacks.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORMsipij
In this paper a robust watermarking method operating in the wavelet domain for grayscale digital imagesis developed. The method first acomputes the differences between the watermark and the HH1 sub-band ofthe cover image values and then embed these differences in one of the frequency sub-bands. The resultsshow that embedding the watermark in the LH1 sub-band gave the best results. The results were evaluatedusing the RMSE and the PSNR of both the original and the watermarked image. Although the watermarkwas recovered perfectly in the ideal case, the addition of Gaussian noise, or compression of the imageusing JPEG with quality less than 100 destroys the embedded watermark. Different experiments werecarried out to test the performance of the proposed method and good results were obtained.
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
The widespread of global internet has led to the need for developing new
methods of protecting multimedia information from exploitation, alteration
or forgery, illegal distribution, and manipulation. An attacker is quickly and
illegally distributing or changing multimedia information by using various
means of computer technology. For detecting this manipulation, this paper
suggests blind watermark image inside a host image for observing in the
receiver. If the watermark image was retrieved, then the host image was not
attacked or manipulated. While if not retrieved, in this case, the image was
attacked. The proposed method is depending on a decomposition of the host
image using lowest energy sub-bands of contourlet transform (4-levels), with
scrambling by ikeda map of the watermark image, and selecting new
positions by modified arnold cat map. This will produce more security and
safety, as well as provide more difficulty or prevent hacking. The obtained
results confirm the robustness against attacks and more effectiveness of the
presented scheme compared with the other similar works. Also, using lowest
energy sub-bands will expand area of embedding and this part will be
considered in the future works with the color images.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
Similar to BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES (20)
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
1. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
DOI:10.5121/ijma.2021.13202 15
*Corresponding author.
E-mail address: xchen@ahnu.edu.cn
BLIND EXTRACTION OF DIGITAL WATERMARKING
ALGORITHM FOR COLOR IMAGES
Xuecheng Gong, Wanggen Li and Wang Jing
School of Computer and Information, Anhui Normal University, Anhui Wuhu, China
ABSTRACT
Digital watermark technology hides copyright information in digital images, effectively protecting the
copyright of digital images. At present, the color image digital watermarking algorithm still has defects
such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the
above problems, this paper studies the digital watermarking method based on discrete wavelet transform
and discrete cosine transform. Then this paper proposes a color image blind digital watermarking
algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y
component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and
perform the discrete cosine transform. finally, use the embedding method to convert the watermark
information after the Arnold transform embedded in the block. The experimental results show that the
PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being
attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm
has good robustness and can achieve watermarking blind extraction.
KEYWORDS
QR Code; Color Image; Arnold Transform; Discrete Wavelet Transform; Discrete Wavelet Transform
1. INTRODUCTION
With the development of the Internet, various digital works have appeared on the Internet. At the
same time, with the rapid development of information digitization, there has also been a problem
that copyright is not easy to protect[1]. Due to the ease of dissemination and copying of digital
images, all kinds of piracy have emerged one after another and the copyright protection of digital
images has become increasingly serious. Regarding the copyright protection and copyright
authentication of digital media products, the traditional copyright protection method is
information encryption, which processes digital information through a certain mathematical
method, so that it cannot be correctly identified without knowing the encryption method and key.
Information encryption protects copyright to a certain extent, but traditional information
encryption methods will disrupt encrypted information and cause damage to digital
information[2].
As a method of solving copyright protection problems, digital watermarking is a technology that
embeds designated digital identification information into digital products transmitted over the
network to protect product copyrights and does not affect the use of digital products[3]. The
content of the watermark can be the name of the work, creation time or corporate identity, etc.
The watermark content can prove the copyright owner and can also be used as proof of copyright
protection. According to different embedding methods, it can be divided into spatial domain
2. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
16
watermark and transform domain watermark. At present, embedding the digital watermark into
the carrier image transform domain can better improve the robustness and security of the
watermark. Quick response code (quick response code) is abbreviated as QR code, which is
characterized by storing a large amount of information, low cost, small size, fast display of
information and error correction function[4]. Arnold transform has periodicity and is widely used
in image scrambling. Using its characteristics to transform the position of QR code information
can improve the security of watermarking[5].
2. RELATED WORK
In order to study the digital watermarking algorithm in depth. First, introduce the discrete wavelet
transform and discrete cosine transform used in the digital watermarking algorithm in this paper.
Then introduce the Arnold watermark encryption method and finally introduce the watermark
performance evaluation.
QR code can store not only text information, but also image information. In actual use, due to the
tilt of the shooting, it will be difficult to read and sometimes the QR code will be distorted. The
QR code corrects the image and detects data errors through position detection graphics and
positioning graphics to ensure the integrity of the data. When the code is distorted, the data can
still be recovered through the error correction code. Therefore, using the QR code as a watermark
cannot only improve the robustness of the watermark, but also store more copyright information.
Figure 1. QR code structure
He et al[6]. proposed a color image watermarking algorithm based on discrete wavelet transform,
discrete cosine transform and singular value decomposition (DWT-DCT-SVD). First, convert the
carrier image from the RGB color space to the YUV color space; then, perform a layer of discrete
wavelet transform on the brightness component Y, use discrete cosine transform to decompose
the low frequency and its blocks and perform singular value decomposition on each block;
Finally, embed the watermark into the carrier image. However, there is a problem with the DWT-
DCT-SCD method. A non-blind watermark image is needed to extract the watermark in the
experiment and the watermark non-QR code is used in the experiment.
Xu Jiangfeng et al[7]. proposed a digital watermarking scheme combining QR code, chaotic
system and DWT-DCT. Carry out DWT operation on the carrier image and perform 4×4 block
and DCT operation on the low-frequency subbands, embed the QR code watermark through the
chaotic system into the carrier image. The experimental results show that after the Gaussian noise
attack, the PSNR value and the NC value are low and the experiment uses gray-scale images,
which is less practical. To solve the above problems, this paper proposes a color image blind
digital watermarking scheme based on QR code. This scheme selects a color image as the carrier
image, converts the RGB color space to the YCbCr color space, embeds the watermark into the
luminance component Y and uses the Arnold transformation to encrypt the QR code, which not
3. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
17
only improves the security and robustness of the watermark, but also Increased the amount of
watermark information.
Poonam et al[8]. proposed a robust digital watermarking method that uses DWT and SVD
technology to insert the watermark into the singular value of the carrier image frequency domain
subband. The experimental results show that the technology has significant imperceptibility.
Improved, with remarkable robustness when subjected to different attacks.
Sunesh et al[9]. proposed a blind extraction of digital watermark technology using discrete cosine
transform. This is achieved by embedding the watermark into the DCT coefficients of the images
at two different locations. Embedding the same watermark bit in two different locations helps to
maintain security and robustness. Experiments have proved that the proposed watermarking
algorithm has good perceptual ability and low computational complexity.
Sinhal et al[10]. proposed an effective blind extraction and easy-to-detect watermarking scheme
for color images. This solution can detect tampering or forgery in the image and effectively
restore the tampered part. It can be effectively executed against different types of tampering
attacks. In addition, the proposed solution provides self-recovery of the tampered area of the
image and effectively recovers the highly tampered image with acceptable parameters.
Pan et al[11]. proposed a watermarking technology based on the SMS algorithm, which uses
improved discrete wavelet transform and singular value decomposition to hide the watermark in
the QR code and adjusts the embedding strength factor through the SMS algorithm to modify the
strength of the watermark embedded in different frequency domains. The experimental result has
a higher PSNR value and the QR code can still be decoded by a general decoder. The proposed
method is feasible and effective.
2.1. Discrete Wavelet Transform
In digital image processing, it is necessary to discretize the continuous wavelet and its wavelet
transform. The discretized wavelet and its corresponding wavelet transform are called discrete
wavelet transform[12]. Discrete wavelet transform is a spatio-temporal scale analysis method of
information analysis theory and signal. It has multiple scales in space and frequency domain and
can continuously decompose images from low resolution to high resolution[13,14]. In addition,
the DWT algorithm has a wide range of applications in the digital watermarking neighborhood,
and many innovative and efficient joint algorithms related to DWT have been proposed.
In this paper, the RGB color space of the color carrier image is transferred to the YUV color
space and the Y component is DWT to obtain the low-frequency LL in the horizontal and vertical
directions, the low-frequency in the horizontal direction and the high-frequency LH in the
vertical direction, the high-frequency in the horizontal direction and the low-frequency HL in the
vertical direction.And high-frequency components HH in the horizontal and vertical directions.
DWT is performed on the LL subband again to obtain the low frequency component LL2. The
low-frequency components represent image features, the high-frequency components represent
the edges and details of the image. Embedding the watermark in the low frequency component
LL2 can improve the robustness.
4. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
18
Figure 2. decomposition diagram
2.2. Discrete Cosine Transform
The principle of Discrete Cosine Transform is to discretize even-numbered terms in the
expansion of Discrete Fourier Transform. Discrete Cosine Transform can convert spatial domain
signals to frequency domain signals and has good decorrelation performance[15]. The two-
dimensional DCT transform can be obtained by two one-dimensional transforms and the DCT
transform is a reversible transform, often used in signal processing and image compression[16].
The digital image is processed by DCT transformation to obtain low frequency, intermediate
frequency and high frequency[17]. The low frequency part is the part in the image related data
set. The high frequency part is watermarked, and the watermark information is easily lost when
attacked. The intermediate frequency part is the best position for watermarking. The important
information of the image after the discrete cosine transform is concentrated on the middle and
low frequency coefficients and the position is the upper left corner of the DCT matrix, which has
the ability to resist attacks. After being attacked, the embedded watermark information can still
be extracted. In this paper, the LL2 subband is divided into blocks, the blocks are subjected to
DCT transformation and then the medium and low frequency coefficients are selected for
watermark embedding, the DCT inverse transformation completes the image reconstruction., As
shown in the formula (1) and (2), f(i,j) is the original signal, F(u,v) is the coefficient after DCT
transformation, N is the number of points of the original signal, c(u) and c(v) can be considered
as the compensation coefficient and the DCT transformation matrix can be made into an
orthogonal matrix.
F(u, v) = c(u)c(v) ∑ ∑ f(i, j)cos [
(i+0.5)π
N
u] cos [
(j+0.5)π
N
v]
N−1
j=0
N−1
i=0 (1)
c(u) =
{
√
1
N
u = 0
√
2
N
u ≠ 0
(2)
2.3. Arnold Transformation
Arnold transformation is also called cat face transformation, which transforms a meaningful
image into a meaningless image by scrambling the image. The watermark image contains
important information[18]. The Arnold transform is used to scramble the image to achieve
information encryption. At the same time, the Arnold transform is periodic and the number of
scrambling can be used as the watermark key to further enhance its security. The periodicity of
Arnold transformation refers to the continuous transformation of the original image and the
Y component
LL2
5. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
19
original image is obtained after T times. The transformation period T is related to the size of the
image M×N[19]. The Arnold transformation is defined as follows:
[
x∗
y∗] = [
1 1
1 2
] [
x
y] (mod N)(3)
Among them, (x,y) represents the pixel position before image scrambling, (x*,y*) represents the
image pixel location after scrambling and N represents the order of the image matrix.
3. EMBEDDING AND EXTRACTION OF WATERMARK
This article uses QR code as the watermark map, which adds more information and improves the
security of the watermark. The use of color images as carrier images is more widely used.
3.1. Embedding of watermark
a) Convert the color carrier image from RGB color space to YCbCr color space according to
the algorithm flow and extract the brightness component Y.
b) Perform a two-level DWT transformation on the luminance component to obtain the low
frequency subband LL2, then implement 2×2 block division on the LL2 subband to obtain
a block matrix.
c) Perform DCT transformation on each block (dct=dct(LL2)) to obtain the transformed DCT
matrix. Then extract the first value in the matrix from the DCT transformed block to form a
new matrix F.
d) Use Arnold transform algorithm to scramble the original watermark image W to get the
scrambled watermark W*.
e) Embed the watermark W* into the matrix F using equations (4) and (5) to obtain the matrix
F*. Then replace each value of the matrix F* with the first value of each block in turn, and
perform inverse DCT transformation on each block to obtain LL2*.
𝜆1
∗
= {
𝜆1 − 𝑇 + 3a/4 𝑇 ≥ a/4
𝜆1 − 𝑇 − a/4 𝑜𝑡ℎ𝑒𝑟
𝑊∗(𝑖, 𝑗) = 0 (4)
𝜆1
∗
= {
𝜆1 − 𝑇 + 5a/4 𝑇 ≥ 3a/4
𝜆1 − 𝑇 + a/4 𝑜𝑡ℎ𝑒𝑟
𝑊∗(𝑖, 𝑗) = 1(5)
Among them, T=λ_1 moda, a is the embedding strength. Used to control the invisibility and
robustness of embedded watermarks. λ1 represents each value in each block matrix. λ_1^*
Represents the embedded value.
f) Implement the second-level inverse DWT transformation on the obtained in the previous
step to obtain the component. The brightness component of the embedded QR code is
converted from the YCbCrcolor space to the RGB color space to obtain the color carrier
image embedded in the QR code. Figure 3 is a flowchart of watermark embedding.
6. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
20
Figure 3. Watermarking embedding flow chart.
3.2. Extract Watermark
a) First, convert the color carrier image embedded with QR code from RGB color space to
YCbCr color space and extract the brightness component Y*.
b) Perform two-level DWT transformation on the luminance component to obtain the low-
frequency subband. Then perform 2×2 block on the subband.
c) Perform DCT transformation on each block to obtain the transformed DCT matrix.
dct=dct(LL2*). Then extract the first value in the matrix from the block after DCT
transformation to form a matrix F*.
d) The extraction of watermark information is the reverse process of watermark embedding.
The watermark is extracted by equations (6).
W(i, j) = {
1 T > 𝑎/2
0 other
(6)
e) According to the obtained W* in the previous step. Then perform Arnold transformation on
it. Finally the watermark W is extracted. Figure 4 is a flow chart of watermark extraction.
Figure 4. Watermarking extraction flow chart.
4. THE EXPERIMENTAL RESULTS
The experimental environment is: Intel Core i5-4210M CPU; 2.60GHz frequency; Windows 10
64-bit operating system; Matlab2018a software. Select the color carrier image with 512×512
pixels, the 64×64 QR code is the watermark and the QR code carries the information. Figure 5(a)
is a color carrier image, and Figure 5(b) is a QR code watermark image.
Color
Image
Y LL2
RGB to
YCbCr
DWT DCT
Y
Watermarking
image
Encryption
QR
Watermarking
Arnold
Embedding
method
YCbCr to
RGB
IDCT
Divided LL2
into
2*2block Merge Blocks
And apply IDWT
Watermark
ing Image
Y LL2
RGB to
YCbCr
DWT DCT
Arnold
Extraction
Method
Extracted QR
watermark
Divided LL2
into
2*2block
7. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
21
a)Color Image (b)QR Code
Figure 5. Experiment Pictures.
4.1. Watermark Evaluation standard
Whether the performance of digital watermarking algorithm reaches the standard of research and
application is mainly judged by two aspects: one is the invisibility of watermark, which is
evaluated by subjective evaluation of human eyes or quantitative calculation of objective
methods. The second is the robustness of watermark, that is the watermark resistance to attack,
which means whether the watermark image can extract effective watermark information after
being attacked. The performance evaluation criteria and indexes of the two watermarking
algorithms are described below.
Watermark invisibility refers to the high similarity between the original image and the
watermarked image. One detection method is that the human eye cannot detect the watermark
information hidden in the image and does not affect the use of the original image, so the
invisibility of the watermark algorithm is better. Another detection method is to detect invisibility
by using performance evaluation indicators, signal-to-noise ratio (SNR), peak signal-to-noise
ratio (PSNR) and mean square error (MSE).
Experiments usually use peak signal-to-noise ratio (PSNR) to measure the difference between the
QR code-embedded image and the unembedded original image. The greater the PSNR, the higher
the recognition of the image embedded in the QR code with the original image. The definition of
PSNR is:
PSNR = 10log10
2552M×N
∑ ∑ (I∗(x,y)−I(x,y))2
N−1
y=0
M−1
x=0
(7)
Among them, represents a watermarked color carrier image and I represents a color carrier
image. When the PSNR value is greater, the color carrier image is closer to the watermarked
color carrier image. The embedded watermark effect is better. PSNR>30dB usually means that
the watermark is invisible and the image quality is better.
Robustness means that the watermarking algorithm can resist common attacks such as
compression, clipping, noise, and clipping. Generally speaking, if the digital watermark is highly
robust, the digital watermark has strong anti-attack ability. In the experimental part of this article,
the normalized correlation coefficient (NC) is used as an objective index to evaluate the attacked
watermark. The robustness of the watermark is detected by comparing the original watermark
information and the watermark extracted from the carrier image. NC represents the similarity
between the original watermark and the extracted watermark. The NC value ranges from 0 to 1.
The closer the NC value is to 1, the higher the similarity between the original watermark and the
extracted watermark. The definition of NC is:
8. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
22
NC =
∑ ∑ W(x,y)W∗(x,y)
N−1
y=0
M−1
x=0
√∑ ∑ W(x,y)2 ∑ ∑ W∗(x,y)
N−1
y=0
M−1
x=0
2
N−1
y=0
M−1
x=0
(8)
Among them, W represents the original watermark image. represents the extracted watermark
image.
4.2. Analysis of Results
In order to test the robustness of the algorithm, the experiment uses JPEG compression, noise
filtering, cropping attack, rotation attack and median filtering to attack watermarked images.
a) JPEG compression.
Table 1. JPEG Compression.
(a)JPEG(10%) (b)Extracted(a=1) (c)JPEG(80%) (d)Extract(a=1)
In the experiment, the JPEG compression attack was performed on the image. Table 1(a)-(d) are
the results of the JPEG compression attack under different factors. It can be measured that the
extracted QR code can be recognized by the machine.
According to the data in Table 2, when the JPEG compression factor is 10%, the PSNR value is
48.9158 and the NC value is 1. At this time, the QR code can still be identified, indicating that
the algorithm in this paper is robust against JPEG compression attacks and can ensure the
integrity of the watermark information.
Table 2. JPEG Compression attack data.
Methods
Compression Ratio
10% 20% 30% 40% 60% 80%
PSNR/dB
NC
48.9158
1
50.0294
1
50.6425
1
51.0356
1
51.6767
1
52.5922
1
b) Noise attack. The experiment uses salt and pepper noise and Gaussian noise attacks, as
shown in Table 3.
Table 3. Noise attack.
(a)Salt and Pepper(0.15) (b)Extracted(a=2) (c)Gaussian(0.04) (d)Extract(a=2)
9. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
23
Table 4. Noise attack data.
Method
Salt and Pepper Noise Gaussian Noise
0.01 0.05 0.15 0.01 0.02 0.03 0.04
PSNR/dB 45.3121
41.7544
37.9263
43.0325
42.9243 42.7836
42.5694
NC 1 1 09687 1 0.9997 09995 0.9962
It can be seen from Table 4 that the PSNR value of the color carrier image embedded with the
QR code is attacked by salt and pepper noise and Gaussian noise respectively. The PSNR value is
also above 30dB. It indicating that the attacked carrier image shows strong robustness and can
resist noise attack. From the perspective of the NC value, the extracted watermark maintains a
high consistency with the original watermark and the extracted watermark can be identified.
c) Cropping attack. It can be seen from the different cropping areas in Table 6 that the QR
code is embedded in the frequency domain of the carrier image. The cropping of different
areas can still maintain a high NC value, the PSNR value can also be maintained above
30dB and the QR code can be Identified. Therefore, this algorithm has good resistance to
shearing attacks.
Table 5. Cropping attack.
(a)Cropping(1/16) (b)Extracted(a=2) (c)Cropping(1/128) (d)Extract(a=2)
Table 6. Cropping attack data.
Method
CroppingRatio
1/8 1/16 1/32 1/64 1/128 1/256
PSNR/dB 41.3916 41.3724 43.0706 45.3883 45.8662 46.0592
NC 0.9600 0.9589 0.9782 0.9868 0.9928 0.9951
d) Rotation attack and Median filtering. It can be concluded from Table 7 that the algorithm
can resist rotation attacks and median filtering. The PSNR values are all above 30dB and
the NC values remain above 0.9. It shows that the algorithm has good robustness.
Table 7. Rotation attack and Median filtering data.
Method
Rotation Angle Median Filtering
5° 10° [3×3]
PSNR/dB
42.4715 40.4322 45.2474
NC 0.9693 0.9558 0.9991
e) Comparison results. It can be seen from Table 8 that in the median filter attack, the
algorithm in this paper is better than the non-blind QR code watermarking algorithm in the
literature [7]. In this paper, the NC values of Gaussian noise and salt and pepper noise are
both higher than 0.9. When the JPEG compression factor is 30%, the NC value reaches 1,
10. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
24
which is higher than the NC value in the literature [7]. It can be concluded that the
algorithm in this paper is more robust than the algorithm in [7].
Table 8. Compare the results of different experiments.
Attacks
NC(Proposed
Method)
NC(Reference
[7])
JPEG Compression 30%
1
0.9875
Cropping 1/16 0.9589 —
Gaussian Noise 0.04 0.9962 0.9300
Salt and Pepper Noise 0.05 1 0.9849
Median Filtering [3×3] 0.9991 0.9873
As shown in Figure 6, use the following images to conduct non-attack and attack experiments.
Perform watermark extraction and NC value calculation on watermarked images to check
whether the scheme in this chapter can be applied to a wide range of digital images.
flower Lena middle strawberries
Figure 6. Experiment Pictures.
As shown in the table 9, when the image is not attacked, the NC value of the extracted watermark
information is equal to 1; after the attack, the NC value of most of the extracted watermark
information is in the range of [0.9-1]. It is proved that the method proposed in this chapter can
resist common attacks and the extracted watermark information is similar and consistent with the
original watermark. The algorithm has good performance and the watermark is robust.
Table 9. Compare the results of different experiments.
Methods unattack
JPEGComperess
30%
Median
Filtering
[3×3]
Gaussian
Noise
0.01
Rotation
5°
Cropping
1/64
flower 1 1 1 0.9938 0.9731 0.9859
Lena 1 1 1 0.9899 0.9732 0.9861
middle 1 0.9998 0.9965 0.9938 0.9750 0.9876
strawberries 1 0.9982 0.9978 0.9786 0.9735 0.9874
In order to verify that the algorithm is universal, this article adds experimental images to verify
the reliability of the experiment. The experimental data is shown in the table. The normalized
correlation coefficients of the extracted watermarks are calculated for each image in the table
without attack and under attack. From the calculated data, it can be known that the algorithm in
this paper has good robustness to various attacks,it can resist external attacks and can be used for
color image digital watermarking.
11. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
25
5. CONCLUSIONS
In this paper, color images are used as carrier images and QR codes are used as watermark
information, which increases the amount of watermark information carried and also improves the
watermark's anti-attack ability. The implementation of Arnold transformation on QR code and
implementation of DWT, DCT and block operations on the carrier image effectively strengthen
the robustness of the watermark. By embedding watermarks on multiple color images, the
algorithm still shows good anti-attack ability, indicating that the algorithm can be used for color
images. The attack experiment data also shows that the algorithm in this paper is resistant to
JPEG compression, clipping attack, Gaussian noise, salt and pepper noise, median filter and
rotation attack, the PSNR value is above 30dB. The algorithm proposed in this paper also has
shortcomings. In a rotation attack, when the rotation angle exceeds 12°, the extracted QR code
will not be recognized and information cannot be obtained through the device. In view of the
above problems, the algorithm needs to be continuously improved.
ACKNOWLEDGEMENTS
This work is supported by the Fund Project: Project of the Leading Talents in Colleges and
Universities of Anhui Province(gxfxZD2016014).The authors would like to thank my teacher for
his guidance and the anonymous reviewers for providing valuable comments on the manuscript.
REFERENCES
[1] P. Rasti& S. Samiei, M, et al,(2016) “Robust non-blind color video watermarking using QR
decomposition and entropy analysis,” J. Vis. Commun. Image Represent., vol. 38, no. 5,pp. 838–847.
[2] J. Wang & Z. Du, (2019)“A method of processing color image watermarking based on the Haar
wavelet,” J. Vis. Commun. Image Represent., vol. 64, pp. 102627.
[3] S. Kushlev& R. P. Mironov, (2020) “Analysis for Watermark in Medical Image using Watermarking
with Wavelet Transform and DCT,” 2020 55th Int. Sci. Conf. Information, Commun. Energy Syst.
Technol. ICEST 2020 - Proc., pp. 185–188.
[4] Bai TaoTao& Liu Zhen, et al, (2014) “Contourlet domain digital watermarking algorithm based on
QR code,”Optoelectronics·Laser,vol. 25, no. 4, pp. 769-776.
[5] Li Guohe& Chen Chen, et al, (2018) “Digital watermark insertion and extraction method for QR
code, ”Computer Engineering and Applications, vol. 55, no. 10, PP. 103-107, 114.
[6] Y. He & Y. Hu, (2018) “A Proposed Digital Image Watermarking Based on DWT-DCT-SVD,” Proc.
2018 2nd IEEE Adv. Inf. Manag. Commun. Electron. Autom. Control Conf. pp. 1214–1218.
[7] Xu Jiangfeng& Zhang Shouqiang, (2018) “DWT-DCT digital watermarking algorithm based on QR
code,” Application Research of Computers, vol. 35, no. 5, pp. 1540–1544.
[8] Poonam & S. M. Arora, (2018) “A DWT-SVD based Robust Digital Watermarking for Digital
Images,” Procedia Comput. Sci., vol. 132, pp. 1441–1448.
[9] Sunesh&R.Rama Kishore, (2020) “A Novel and Efficient Blind Image Watermarking in Transform
Domain,” Procedia Comput. Sci., vol. 167, no. 2019, pp. 1505–1514.
[10] R. Sinhal& I. A. Ansari, et al, (2020) Ahn, “Blind Image Watermarking for Localization and
Restoration of Color Images,” IEEE Access, vol. 8, pp. 200157–200169.
[11] J. S. Pan & X. X. Sun, et al, (2020) “Digital watermarking with improved SMS applied for QR code,”
Eng. Appl. Artif. Intell., vol. 97, no. November 2020, pp. 104049.
[12] Yuan Zihan& Liu Decheng, et al, (2020) “New image blind watermarking method based on two-
dimensional discrete cosine transform,” Optik (Stuttg), vol. 204, no. February 2020, pp. 164152.
[13] Zhu Jianzhong& Yao Zhiqiang, (2014). “Color image blind watermarking algorithm based on DWT-
SVD and Turbo code,” Journal of Jilin University: Science Edition, vol. 52, no. 4 pp. 773–778.
[14] Y. A. Mekarsari& D. R. I. M. Setiadi, et al, (2018) “Non-blind RGB image watermarking technique
using 2-level discrete wavelet transform and singular value decomposition,” 2018 Int. Conf. Inf.
Commun. Technol, vol. 2018-Janua, pp. 623–627.
12. The International Journal of Multimedia & Its Applications (IJMA) Vol.13, No. 1/2, April 2021
26
[15] M. Ali & C. W. Ahn, et al, (2014) “A robust image watermarking technique using SVD and
differential evolution in DCT domain,” Optik (Stuttg), vol. 125, no. 1, pp. 428–434.
[16] D. O. Munoz-Ramirez & V. Ponomaryov, et al, (2018) “A robust watermarking scheme to JPEG
compression for embedding a color watermark into digital images,” Proc. 2018 IEEE 9th Int. Conf.
Dependable Syst. Serv. Technol, pp. 619–624.
[17] D. O. Muoz Ramirez & V. Ponomaryov, et al, (2019) “Embedding a Color Watermark into DC
coefficients of DCT from Digital Images,” IEEE Lat. Am. Trans, vol. 17, no. 8, pp. 1326–1334.
[18] Wu Fengbo& Wang Feng, (2016) “Wavelet transform digital image watermarking algorithm based
on HVS,” Applied Optics, vol. 35, no. 2, pp. 254–259.
[19] S. Saadi& A. Merrad, (2019) “Novel secured scheme for blind audio/speech norm-space
watermarking by Arnold algorithm,” Signal Processing, vol. 154, pp. 74–86.
AUTHORS
Xuecheng Gong born in 1994, male, who studies at the Anhui Normal University,
researching image processing.
Wanggen Li born in 1973, male, professor at the Anhui Normal University. His current
research interests include biological computing and intelligent computing.
Wang Jing born in 1995, male, who studies at the Anhui Normal University,
researching image processing and intelligent computing.